Академический Документы
Профессиональный Документы
Культура Документы
Mahmood Rehmani
The second issue of Engineer (PEC) is in your hands! It is more progressive and contains a greater
number of thought provoking articles related to various engineering disciplines. The aim is to
make it a magazine of National and International repute. We are slowly and gradually moving
towards our cherished goal of making it a peer reviewed/ referred Journal. This aim can only be
achieved through the cooperation and scholarly efforts of our engineering community. We expect
all engineers to come forward and join hands to make this dream come true. Using this forum, we
request the engineering community to share their experiences, thoughts, R&D activities,
unpublished thesis and genuine efforts related to their profession. Contributions related to
accreditation of engineering programs are also welcome. Hopefully ‘Engineer (PEC)’ will become a
Journal, wherein publishing of research papers would be the desire of any one involved in the
engineering profession. Your views, suggestions and contributions may be addressed to:-
The Editorial Board wishes to convey its deep appreciation for the scholarly efforts of all authors
whose papers appear in this magazine. We expect all engineers to contribute articles for
“Engineer (PEC)” which is their own magazine. We would also like to say a special word of thanks
to the enthusiastic team of management and staff who remained behind the scene yet put in their
heart and soul to make this magazine reach your hands. Happy reading!!!
This issue of Engineer (PEC) can be downloaded from our website: www.pec.org.pk
CONTENTS
Topic Page #
Seismic Architecture 7
An Improved Network Security Perimeter the users, administrators and hackers scale the security
for Proficient Resistance at Maligned solutions through the nuisance or ease of working. In fact,
the seller buys the solution and not the security. At the end
Endpoints of the day, the blame of failure is deposited to ‘not updating
timely’. Today, a corporate network consists of security
Engr. Adnan A. Arain , Dr. Abdul Qadeer Khan Rajput , devices, applications, firewalls, sensors, fingerprint
Engr M.I. Khan, M.Sc Telecom & Electronics agents, filters, intrusion detection, and prevention systems
to participate in security perimeter design [6][9][14]. Our
Abstract research is based on the analysis of providing an
enhanced and synchronized version of security perimeter.
Designing network security perimeters to nullify security The solutions must be designed to respond the security
threats, is the objective of giants involved in the needs of a network and not the vice-versa.
development of security applications and devices. An
organization, not compromising on security, dedicates a Another critical situation arises when internal network is
hefty budget proportion for deploying security plans and turned internally for attacks. During HELLO, the catalyst
updates. Fighting and chasing the modern attackers 24x7 considers the node(s) as privileged and enters its MAC in
has enforced thoughts of redesigning security framework. CAM table without knowing destination address [16][17]. It
Existing perimeter is layered of border routers, firewalls, creates traffic by forwarding the frame for authentication
IDS, IPS, VPN devices, software architecture over DMZs on all ports except the one, it came from. Authentication is
and subnets, beside server and host filters and antivirus responded and MAC of the server is entered with
applications. These are not fully customizable against destination entry to establish an authentic link for further
adversaries in providing strong security framework. The communication. In traditional network, usually, this is the
current deployment nature of security perimeter where time for seeking updates of various profiles including
these layered components are prone to various egress antivirus. What, if a malicious endpoint corrupts or attacks
and ingress nasty activities raises some serious questions. its switched-neighbors before the antivirus updates this
The traditional perimeters do not provide sufficient security client. Now, whatever the solution exists, it shall be the
to overcome these limitations in order to provide reactive. Searching for some proactive measures shall
uncompromised security nodes. To address security take you buying another tool without scaled security but
needs efficiently, at critical knots within a network, we doubtful promises.
introduce a security framework. The proposed framework
focuses three key areas related to defense-in-depth; (1) The only thing growing as quickly as the number of security
maximizing synchronization among layered security threats to the network is the number of tools one has to
services (2) modularizing various services for better deploy to guard against them. How many security tools do
endpoint security (3) reducing traffic while providing we have in our existing network today? More to the point,
secure mechanism for passive updates in traditional how much time does a security administrator spend
networks. We show through analysis and emulation that managing these tools installing upgrades, downloading
our proposed framework meets the unique security needs new signature files, and so on? It's overwhelming [18].
of network infrastructure in a better way.
We make following contributions in this paper: We tried to
Key words achieve maximum synchronization among components of
existing security perimeter by redefining the service points.
Security perimeter, Distributed security services, Network This improves performance metric of core layer of the
access control (NAC) network concerning the speed, traffic load and transparent
control.
Introduction
We presented a more secure framework of network
Advancements in interception, intrusion, modification and security perimeter that addresses potential threats in node
fabrication posed potential threats to security perimeter of and helps defining modularity among security components
the time. Inescapable battle has been set and various effectively. It also works with existing blocks of the
mature hijacking and sniffing systems have been traditional networks.
developed. This is why a large portion of corporate budget
sinks in buying competitive security solutions. These We identified critical challenges, the components facing in
solutions projects lists of precautions indicating the way a the internal-network and emulated the proposed
network should be accessed. Instead of molding the framework in components at access layer. This speeds-up
solution for the network, the network is asked to change and liberates the core layer from unwanted traffic to
the priorities. In fact, the level of security of these solutions confirm its efficiency.
is not scaled accurately for responsiveness, efficiency and
reliability by vendors themselves. The history proves that
2
ENGINEER PEC September 2007
We put forward a secure mechanism for sending antivirus bandwidth management, virus scanning, anti-spam, anti-
updates in traditional networks from access layer or phishing and more [5][11].
distribution layer instead of servers themselves. This helps
to reduce the amount of traffic on the core layer. Our proposed network security framework
Rest of the paper is organized as follows. Section 2 Our proposed framework is detailed for understanding in
provides summary of related work in security perimeter following paragraphs.
building blocks. Section 3 presents our security framework
while discussing the synchronization of policy based Maximizing synchronization
services, antivirus applications, role of catalyst,
handshaking of routing components with communication Success rests in the fact that the policy-based services or
nodes down the network, mechanism and arrival of firewall, secure routing schemes, authentication
updates before the authentication process of an endpoint mechanisms, antivirus, applications and hardware must
occurs. Section 4 gives analysis of our proposed security be, theoretically, one entity [10].
framework, evaluation and comparison of results. Section
5 portrays the future roadmap, whereas sections 6 and 7 It is achieved by distributing services carefully and
have been summarized for conclusion and capitalizing the synchronization among these services.
recommendations for an integrated framework in modern Figure 1 next, shows a theoretical defense-in-depth single
designs of hardware. window solution.
Related work
AUTHENTICATION
We dealt the security issues with an equal perspective of FIREWALL (Client-Server) SPECIAL FILTERS (server)
both, the hackers, and of them who research in security. BORDER ROUTER ANTIVIRUS (Client-Server)
image or identity of any point from client or server and ID and IP SENSORS ALERTS/ NOTIFICATIONS Host or Client
beyond. Few waits for an opportunity to attack but
generally they are in process of perceiving the faults in VPN DEVICES IPS (Host/Server)
systems that the security builders, often do not know while IDS (Host/Server)
launching solutions.
Researchers have addressed many areas of the network Figure 1 Ideal security perimeter: The window view
security perimeter. Majority of the research has focused on
strengthening the individual perception of components like Modularizing the solution for potential threats
firewall, activity filter, antivirus sensitivity, secure routing,
secure key distribution and securing server or node In order to take real-time advantages from the system in
privacy. Whereas, work in bits is found on the components existing infrastructure the existing perimeter was
synchronization and interdependencies while providing appended to analyze the performance and tolerance to the
logical separation among all components to provide network. Today the existing designs of network security
defense-in-depth. The security fence needs to be perimeter present the layers-of-devices but functionally
quantified as a whole. overlapping of results of these devices cause failure of the
perimeter fence [4][6]. Figure 2 below shows a logically
Developing platform independent prevention and separated services view to achieve fundamental
detection tools [1][4][8], enforcement and approaching objectives from the security perimeter.
new security policies [2][4][6][7], and strengthening
antivirus applications [10][13][15] have been a few kinds of Minimizing the unnecessary traffic load and avoiding
work in this direction. Introducing endpoint security with threats at core layer
network access control (NAC) has challenged the security
consultants to revise the corporate security needs and The main issue at the backbone or core layer is that any
number of tools employed for the desired security [3][12]. failure (even in terms of delay) will likely be felt everyone
within the inter-network. The Speed plays a vital role at
Learning that ‘it is vain to do with more what can be done core layer. Due to sheer volume of traffic that will be
with fewer’ - William of Ockham - a few gateways are free entering the backbone, few activities that consume routing
to install as a replacement of personal hodge-podge of or switching resources should be applied in this layer. In
security solution. These claim to be a single, integrated, other words, routing, ACL-access lists, ACE-access
enterprise-grade tool that provides a firewall, VPN, entries compression encryption, and other resource
3
ENGINEER PEC September 2007
consuming activities should be done before the packet a single log. The single logger can be a powerful analyzing
arrives at the core [8][14][16][17], as shown in Figure 3. tool or administrator. We were accustomed with Snort® in
our scenario. The antivirus server performs the following
AUTHENTICATION ALERTS/ NOTIFICATIONS functions.
AVAILABIITY VPN DEVICES LOG MAINTENANCE INTEGRITY Antivirus server shall PUSH passive updates once on each
destination (catalyst) as soon as, routers flood framed
DIRECT REGULAR
UPDATES FOR EACH <HELLO> for authentication. This contains updates in
passive format and are, usually, in kilobytes.
`
FIREWALL (Client-Server)
ANTIVIRUS (Client-Server)
Every time a membership changes on joining or disjoining
IPS (Host/Server)
group, the server serves the query if any update is received
from the builder of the antivirus. The switch with passive
SECURITY ID and IP SENSORS
CONFIDENTIALITY virus updates is responsible for following tasks. If this is a
SPECIAL FILTERS (server) BORDER ROUTER
distribution layer switch then, it shall PUSH updates to
access layer’s configurable switch.
IDS (Host/Server)
Server farm
AV-update
of proposed framework, in the model given in figure 3, is
performed by ‘routing and information server’. It played the
AV-update role of flash-memory updater in switches. Consequently,
Gigabit Switch
we propagate memory resident passive elements among
the hosts linked to our special PC-router at access layer.
AV -update
s Application sat antivirus server signs a contract with
bp 10 available access layer catalyst through the device API. It
00M 0 Mb
1 Router ps overrides passive elements in the flash memory of the
AV-update manageable catalyst.
10/ 100 Mbps
10/
100
Switch AV-update
Switch Assessment of the proposed framework
Mbp
s
AV-update
AV-update This section consists of two parts. The first part gives an
analysis of the presented proposal through arguments,
Client Client
and second part analyzes the results of the evaluation
which support the arguments presented in the first part.
Figure 3. Updates in the traditional security framework
Analysis of the proposed framework
Secure framework
This section presents an analysis of the features of the
Acclimatizing a traditional network with core, distribution proposed framework [refer section 3]. Those features
and access layer devices and each service is running from make the framework feasible to implement in existing
the farm-of-servers obliging the results from each other at network infrastructures. Unlike other security perimeters,
4
ENGINEER PEC September 2007
the switches in the proposed framework do not generate or configurable switches into consideration that do not
direct the redundant traffic at every nook and cranny of the participate in storing and sending <AV-HELLO> related
core layer. This traffic reduction is due to the nearby elements. These switches can not use IGMP to find out the
accessibility of regularly deemed updates, alerts, multicast hosts. Now router can direct these switches
notifications, acknowledgements and log reports about multicast group membership using CGMP. This
maintenance by endpoint security applications. allows multicast-enabled switches to forward multicasts
only to hosts that are new and participating in the group.
As, the execution of compatible updates is only at client This shall save further need of processing cost in switches
side therefore, neither complexity nor memory upgrade is to accommodate this framework.
required in the switches of the access layer. This makes
the updating process. For these reasons, the constraint of The switches deployed can be further reprogrammed to
hardcode has negligible effect on the results. remove MAC of corrupt node for the strict security in the
network by employing some rules. Assuming the ongoing
Whereas, the proposed flow of the update mechanism in developments in network infrastructure, catalyst
figure 4 provides stronger resilience towards various processing and storage, adaptive networks, it can be
internal attacks and malicious code, e.g. sinkhole, proclaimed that the framework may be deployed in even
continuous ping, hello flood. The flow of security larger networks. The customizable nature of the
information and the update is proposed in such a way that, framework makes it viable for small and medium size
only the privileged applications at server can resend or organizations.
rewrite the entries.
Methods for future integration
The passive elements at client require temporarily
acquired permission from the client operating system. This Now, we intend to project efforts in two directions. One is to
quantifies the ownership of updating <AV-HELLO> scale this solution over a larger heterogeneous network of
[1][3][9][18]. Distinctiveness of the framework is its ability computers and handheld devices. That development shall
to give maximum protection at first step, from trojans, logic help adaptive rules to veto or pass the communication
bombs, virus, trapdoors, backdoors and information leaks. through the endpoint.
The model lab is set over MUET-campus with 30 nodes An open standard APIs development that‘ll help loosing
with single authentication server. Now the next phase is to monopolized control of companies in security products. On
check the stability and scalability of the solution with all the other hand, it shall help customizing the varying
nodes all over the campus. demands of security perimeter in organizations.The
Switch with resident
cooperation of catalyst vendors can be sought to design a
virus updates
service-oriented hardware that inherits the potential to
implement this framework. Only a powerful module (a
Requires
NO
catalyst in our case) can perform great for security
HELLOs?
perimeter. In general, a dedicated hardware helps to
YES implement a strong security policy. The verification of
passive updates can be sought by “knowledge
HELLO
handshake consistency checker” at distribution or access layer
device.
AV-HELLO
handshake
Conclusion
ACK error? NO
Frame for
This work presents a novel network security perimeter for a
Authenticity
true defense-in-depth approach which is designed from a
YES
healthy synchronization approach embedded at first place
of the network. We have presented a hierarchical model
Check if
retransmit YES
Request to
retransmit
with true logical separations among different services.
HELLOs?
Some services were pre-deployed as the security was a
NO priority. We plan to recommend this framework having
Discard
confidence as first step towards merger of antivirus
MAC entry
& Report services with other network resident services.
The technique presented in this framework takes non- Analyzing the bottlenecks of network security devices and
5
ENGINEER PEC September 2007
tools for delivering the proper support, we suggest that a Characterization Symposium, 2005. Proceedings of
reserved space may be endorsed into catalyst. It shall the IEEE International 6-8 Oct. 2005 Page(s):188 –
serve the purpose of a base station in antivirus client- 196
server architecture for sending passive updates to each 8. Jiang-Neng Yi; Wei-Dong Meng; Wei-Min Ma; Jin-Jun
host in the network. Du; “Assess model of network sec
9. Engr. Adnan A. Arain PhD Scholar, Institute of
References Information Technology, Mehran UET, Jamshoro-PAK
1. Hae-Jin Jeong; Il-Seop Song; et-al; “A Multi- 10. Dr. Abdul Qadeer Khan Rajput
dimension Rule Update in a TCAM-based High- 11. Engr. Muhammad Iqbal ( PEC telecomm / 74)
Performance Network Security System”Advanced
Information Networking and Applications, 2006. AINA About Author
2006, 20th International Conference on Volume 2, 18- Dr. Abdul Qadir Khan. Rajput is a
20 July 2006 Page(s):62 – 66 Meritorious professor, Chief-Patron IT
2. Al-Shaer, E; “Network Security Policies: Verification, Vision Magazine and Vice-Chancellor of
Optimization and Testing” Network Operations and Mehran University of Engineering &
Management Symposium, 2006. NOMS 2006, 10th Technology, Jamshoro. He is winner of
IEEE/IFIP, 2006 Page(s):584 – 584 the “Best Teacher Award, 2000”,
3. Magic quadrant, “Symantec network access control; awarded by the University Grants
the key to endpoint security” advertising section report Commission.
2006, www.symantec.com/endpoint
4. Hamed, H.; Al-Shaer, E; “Taxonomy of conflicts in He has participated in the Advance Learning Workshop on
network security policies” Communications Magazine, Microprocessor, Data communications and At, organized
IEEE, Volume 44,Issue 3,July 2006 Page(s):134-141 by ICTP, TRIESTRE, Italy. He is founder member of the
5. Salim, R.; Rao, G.S.V.R.K;” Design and Development National Committee for Development courses in the field
of Network Intrusion Detection System Detection of computer studies at class IX, X, XI, XII, level (formed by
Scheme on Network Processing Unit” Advanced the MOE curriculum wing) and has edited various books on
Communication Technology, 2006. ICACT 2006, the “Computer Studies” written at the platform of MOE and
8th International Conference, Volume 2,-22 Feb. 2006 also by the Oxford University Press. He is member and
Page(s):1023 - 1025 convenor of National Committee for Development courses
6. Adnan A. Arain, Marvie, Manzoor Hashmani, et-al, “An for BCS, BS(IT), MS(IT), MCS, BS(CS), MS(CS),
analytical revelation for a safer network security BE(CSE), BE(Software Engineering) (formed by
perimeter”, 2006 proceedings of Intentional University Grants Commission) and has participated and
Conference on Information and Networks-ICOIN2006 published more than 60 Research Papers at National and
Sendai, Japan, 14-17 January 2006 International level. He is also Co-author of books on “Data
7. Schaelicke, L.; Freeland, J.C.; “Characterizing Communication” “CompuPedia”, “The Art of Learning C
sources and remedies for packet loss in network and MS-Access” and “Digital Media Technology”.
intrusion detection systems” Workload
MET CO
Marketing Engineering & Trading Co. (Pvt.) Ltd.
METCO (PVT) Limited is committed to achieve complete customer satisfaction
through provision of high quality engineering services in accordance with
contracted specifications and seek continual improvement through compliance
of ISO 9001-2000 Quality Management System.
6
ENGINEER PEC September 2007
7
ENGINEER PEC September 2007
the base. In nutshell redundancy plays a positiverole in A soft storey has less lateral stiffness than immediately
seismic performance as it results in higher plan density. above and weak storey has less strength compared to
above. It is very critical if this condition occur at the first
Configuration story because the forces are greater at this level. Owing to
discontinuity at the second story causes extreme
1. The plan configuration problems of a building are the deflection in the first story and concentration of forces at
reentrant corner (Inside corner). These corners
produce rigidity due to different parts of the building
resulting local tress concentration at the notch of the
reentrant corner. If the ground motion is orthouth, the
wings of Northouth will be stiffer than wings of
Eastestthe former wing would deflect less than the
later, if it were separate but are tied together and
differentially move at notch, pulling and pushing each Types of vertical Irregularities
other. In addition torsion is created, as the center of
mass and center of rigidity cannot coincide forall
possible earthquakes directions. The rotation of joint junction to second storey. Normally the problem is created
depends on the mass of building, structural system, due to change in height of floor, changes in materials,
length of wings and height / depth ratio. There are two discontinuous shear walls and changes in horizontal /
alternatives either to separate building structurally into vertical structure at second storey. The problems are to be
simple shape or to tie the bulding together strongly, at resolved, otherwise, introduce bracing, and add columns
the lines of stress and torsion. and to change design of first story columns. Moreover,
opaque walls of soft story would be lightweight and
2. The variation in perimeter strength and stiffness has detached from resistance system. In no condition long
detrimental effect, which provides seismic resistance. walls are allowed in subsequent stories. The basic
If the resistance is not balanced the detrimental effects principle of seismic design is that in case of severe
are extreme, as the center of mass and center of earthquakes beams will deform plastically before columns,
resistance will not coincidethe torsion will rotate the to avoid total collapse. The weak column, strong because
building on its axis. Open front buildings have three condition should always be avoided. It is important that
shearing walls with opennd and produces torsion. The column should be isolated from bearing walls so as to
opennd can be catered for by designing frame obviate short column condition. The design of vertical set
structure for entire perimeter, shear walls at opennd back (offset) to a building brings discontinuity resulting in
corner and braced frame at openront. change of strength and stiffness. Inverted setbacks, which
make building larger at top but the overturning aspects is
In case of building which are not on parallel and have a more pronounced. The set back should be limited to three
shape of triangle or other than rectangular, the center of fourth in area of storey below it. Buildings having more
mass can not coincide and highest quantum of torsion setbacks should be analyzed as special cases. The
forces are generated under a ground motion. In this form of inverted setback in earthquake area should be altogether
wedge shape building, opaqu walls may be avoided.
introduced.iaphragms are roofs or floors and perform a
role in earthquake nd its connection to shear wallsas great Pounding to adjacent building hitting one another should
significance. Opening and penetration in diaphragms such be avoided. The vertical deflection or drift of adjoining
as staircases, lifts should be carefully placed preferable at buildings is worked out. A space is to be provided between
distance from one another so a keep the strength and these buildings. A few stories building may drift 3 to 8 feet
stiffness of diaphragm constant. Though it is not possible and therefore, needs a separation place double to it. The
to keep stiffness’ of all the floors of multistory building cluster of building in congested areas behaves differently
constant, yet it is beneficial to obviate to minimum soft and and earthquake effects are more significant on end
weak stories. building, while less damage in the inner zone. Adjacent
building, cause some time damages to other buildings and
has to be catered for. On very early, the engineer and
architect should know concept and jointly proceed with
architectural design in earthquake areas. The architect
must understand seismic engineering to conceptual
degree and be comfortable with such shear walls bracing,
moment frames, diaphragms and base isolation. The
engineer should also understand functional needs and
aspiration of architect.
8
ENGINEER PEC September 2007
9
ENGINEER PEC September 2007
deficiencies and cost appraisal of alternatives. Unlike new utility attachment to the structure.
structure, the concept of old structures is to control
deformation whereas in new structure, it has a little The connection of reentrant corner by collector, out of
significance. Due to lack of ductility, the design of seismic plane anchor and continuity ties across diaphragms,
retrofits revolves totally on the control of deformation. For a makes the walls and diaphragms one piece eliminating
ground motion and performance level, the control of deformations. The insufficient bearing in existing building
deformations is to be within accepted levels. The inter- should be improved by enlarging beam area, stiffening the
story drift can reduce the damage to non-structural lateral stiffeners and providing additional vertical supports.
elements (partitions, face work, ceiling). The The brittle structure such as masonry and unreinforced
beam/column, shear wall and diaphragms damages works need special attention. It is most important in the
cannot be controlled due to built in deficit ductility. By some masonry that diaphragms and walls are tied, as these are
changes, sometime it is possible to control such structural very low in strength both in plane and out of plane. In plane
deformation. The expansion joints should not be inter- shortcomings use shotcrete on one face of the wall, infilling
connected in any upgrade system. The inelastic exiting windows and adding supplementary walls. Out of
deformation is beyond prediction by direct elastic analysis. plan shortcoming are dealt with shotcrete, center coring of
the wall, installing dowels and adding strong-backs to
The most difficult case of building is load-bearing walls of stiffen the wall. The selection depends upon the aesthetic
simple masonry. Apart from provision in the codes, it requirements of the building. The concrete frames can be
should be kept in mind that inertia forces generated in any added with shear wall but the whole system is to be
direction can be transmitted back to the ground. The open redesigned from foundation to top as retrofit work. The
storefronts, house over garage, sky windows and shotcrete thickness should not be less than three inches.
expansion joints, lacks in lateral force resisting system and The existing diaphragms may have several shortcomings
warrants improvement. Neither excessive flexibility of such as shear/flexure capacity, flexibility, connectivity and
structure nor its brittle nature is desirable. Flexibility continuity. These defects need to be rectified.
reduces long periods of vibration while brittle materials
such as brick masonry etc loose strength rapidly. Out of Seismic isolation
plane demands of slender walls, inadequate anchorage to
diaphragms and limited strength cause failure. The The detachment of building from the ground in order to
upgrading of open storefront needs vertical line of stop transmission of earthquake motion isolates the
resistance along the sides of building. The braced steel building. In comparison to the conventional method of
frames, shear walls and collectors to distribute loads to stopping acceleration in stiff building and controlling inter-
diaphragms are used. The skylights are provided with storey drifts in flexible structure, the isolation removes
vertical/ horizontal steel trusses. In addition shear walls or defects and building can be made safer. The vertical forces
braced frame can be added to meet deficiencies caused by in conventional design are controlled but performance of
discontinuity of diaphragms. For expansion joint a new seismic forces makes the structure expensive and
lateral resisting elements on each side of joints can be unpredictable. The seismic isolation introduces flexibility
added for transferring horizontal shear across the joint. All at the base in a horizontal plan along with damping to
columns should be connected to foundation and roofing restrict the amplitude of motion resulting from the
members connected to walls, including architectural and earthquake.
10
ENGINEER PEC September 2007
11
ENGINEER PEC September 2007
12
ENGINEER PEC September 2007
Request of amount needed from each department is user’s view of data [1,2]. It is the most important task in the
presented to the finance department containing a unique development of GFPS application. The functions of the
diary number whose data is necessary to be maintained, GFPS are to materialize forms, reports and queries by
consulted and updated. Request contains a total reading or writing the database data. The GFPS is an
requested amount and shows different volumes (if exists) intermediary between the user and the operating system. It
in which request is being considered. In addition, various receives the requests stated in terms of tables and rows
queries are to be answered and reports are required to be and columns and translates those requests into read and
generated. In the present system, a request of financial write requests. A process that involves inferring from user’s
needs contains development as well as non-development statements, forms, reports and queries are gathered and
request. the developers work backwards to infer the structure that
depicts the user’s vision and constructs the data models
Total requested amount is further subdivided into object for GFPS. This is necessary because most users cannot
heads. Each object head has two levels of categories that describe their data models directly. The Entity Relationship
is T or D. If an object head has a level value D then it mean (E-R) model is used to interpret, specify and document the
that it has no further child object head and if it has value T requirements for database processing systems [5]. Since it
then one can define its child object heads. Amount is provides constructs for showing the overall structures of
initially specified against each object head containing level the user’s data requirements, it is specifically used for top
D. Sum of amount against each object head contains level down database design. The major objective in designing
D within a parent object head which must be equal to phase, for GFPS, is to suggest such a system, which is
amount of parent object head. No amount can be directly organized, smooth in running, proficient in handling
specified against object head that is at level T. If amount is information and adequate in all respects. But the point to
requested against salary object head then detail of each be kept in mind is that the prescribed organizational
post is also given against that object head. limitations should not be dominating, more over the
proposed system should be applicable and should
In case of development expenditure request, an enterprise overcome the drawbacks which exist in the present
has different sectors in which different projects are system. Computerized system, known as GFPS, is being
running. A sector may have many projects running in it and presented to meet the requirements of the organization
each project belongs to only one sector. Development and is designed so that all the objectives are achieved [3].
request for each project, along with previous year amount The existing manual system does not satisfy all the
spent on it, comes in a year requesting for capital or objectives of different finance departments. Typical
revenue amount request. Amount is first allocated for a organizational objective is to provide better service to its
particular project. After allocating, it is authorized. users. These objectives can only be achieved if a better
Authorization amount may be split into different intervals. computer based system is satisfying the requirements.
For a particular project total amount authorized cannot be The main goals of the early stages of database
greater than total amount allocated. After a particular development are to build a ‘Data Model’ that documents
authorization is made then amount against authorized the stages to be represented in the database, and to
amount is released and total released amount cannot be establish the relationships among them [8]. Since top-
greater than total amount authorized. Recently the data is down database development approach has been adopted
collected from different departments on papers. Request to design the GFPS, the E-R model has been used to
papers for finance are sent to each department in advance. design and develop the system. A software design is a
After filling these papers each department sends its model of real world system that has many participating
request back to finance department where each incoming entities and the relationships [1] as shown in Figure 1.
request is allocated a unique diary number. There can be a
possibility that requested non-development expenditure
amount from a single or many departments may not be
fulfilled because no excessive amount of current income is
available. In such a case cut is applied on requested
amount on one or more departments as in the form of
percentage.
Software design
13
ENGINEER PEC September 2007
Data Modeling is a basis for all the subsequent work in the programs written in either DBMS specific language – SQL
development of the database and their applications. GFPS or standard languages like COBOL. The design of GFPS
may be defined as a self-describing collection of integrated defines the database and the structure of applications. The
records. GFPS is composed of a set of programs that are design tool comprises a set of tools to facilitate the design
used to define, administer and process the financial and to create the database and its applications [1]. It
information. A partial schema for request of development includes the typical tools for creating tables, designing
expenditure is shown in Figure 2. forms, answering queries and generating the reports. The
GFPS developer uses the ‘Design Tools’ sub-systems
such as data, free tables, queries, documents, forms,
reports, code, and programs. The GFPS processes the
application components that are developed by using
design tools. During run-time, all the functions are
automatic, neither the users nor the developers need to put
any effort once the form is created. The runtime processors
answer the queries and print the reports. There is a run-
time component also that processes the application-
program requests for reading and writing the database
information. GFPS receives requests from the other two
components stated in terms of tables, rows and columns. It
then translates these requests into commands and sends
them to the operating system to read and write the data on
physical media. The GFPS is also involved in transaction
management, locking, backup and recovery. GFPS has
integrated selection of data which is organized to meet
requirements of different users within an enterprise. It can
also be defined as a self-describing collection of integrated
Figure 2 Partial view of development schema in GFPS records. GFPS itself is a collection of data that is treated as
a unit. It is composed of logical and physical structures,
If the data model incorrectly represents the users view of which are designed to store and retrieve the related
the data, they will find application difficult to use, information.
incomplete and very frustrating. Economy, reliability,
responsiveness and modularity are taken into account A GFPS schema defines a database’s structure its tables,
while designing; system has been designed on the basis of relationships, domains and the business rules. A database
user requirements to meet the needs of respective schema is a design, the foundation on which the database
enterprise. The data is processed by the GFPS, which is and the applications are built [6]. For creating the
used by the database developers and the database users; database, we need to build the schema, and after
both can use the GFPS either directly or indirectly via the normalization create the tables. A schema is a description
application programs. of the structure of a database [9]. The database schema
defines the database’s structure, its tables, relationships,
Software development domains and the business rules. The rows of one table can
be related to the rows of other tables. A domain is a set of
A simulator has been developed in DBMS for automating values that a column may have. One must specify a
financial procedures. It contains four major modules (i.e. domain for each column of each table. The business rules
CODE, EXPENDITURE, POSTING and CUT). In GFPS are restrictions on the business activities that must be
pull down operated menu interface has been designed to reflected in a database and the database applications.
provide a good interface to the users.
Once the schema has been designed, the next step is to
The main components of a GFPS system are the GFPS create the ‘GFPS Tables’ using the DBMS’s Data option.
Management and the Application Programs which are Each table’s column name is typed in the field ‘Column
utilized by both developers and users. The database is Name’ and the data type is specified in the field ‘Data
processed by the GFPS, which is used by the database Type’. The used DBMS is very powerful which can
developers and database users. The GFPS is composed coordinate with other DBMS as well [7] for data sharing.
of a set of programs that are used to define, administer and The additional information about the column, such as
process the information. The facilities of DMBS can be width, field format, and caption and data constraints are
used to create table structure to define relationships and to specified in the remaining entry fields of the table creation
create forms, reports and the menus [10,11]. The GFPS form. The final component of a GFPS application is the
also include the facilities for interacting with application application program. The application program is written in
14
ENGINEER PEC September 2007
Evaluation Results
15
ENGINEER PEC September 2007
emphasized upon the team members that they should be which is in harmony with the inherent requirements of the
deliberate and forthright in answering the questions. end users in terms of hardware, software and finance
personnel. This software development is a step forward
The first set of five questions dealt with the overall system towards the overall computerization plan for finance
performance. Ease of handling, ease in monitoring the department. The guidance given by the higher
GFPS, confidence level and reliability of the system were management of different finance departments proved to
the parameters evaluated in this set of questions. The idea be the main drive behind this achievement. The design and
was to ascertain the general level of acceptability of the development work, undertaken for the GFPS, has been
developed system in the minds of the financial experts. covered in detail.
The second set of four questions pertained to procedural This software design and development was purposefully
data incorporated in the system. As these procedures were undertaken since no software development work was
directly responsible in enhancing the financial status of the previously carried out to develop the database system for
establishment it was imperative that their efficacy be finance department. The goals set at the start of this
ascertained and their acceptability determined. Another research have been achieved. The requirement
important factor was to assess whether the members of specifications have been fully implemented, and the
the evaluation team were ready to trust these gadgets. The designed system truly represents and satisfies the user’s
third set of two questions dealt with the security functions requirements. This research has led to the development of
of the GFPS. It was considered necessary to obtain a real working of a financial management system, which
feedback on this utility. The alerts play a very important role can be readily deployed and practically utilized by the
in enhancing the performance of the GFPS. The fourth set finance department. This software has been purposefully
of questions contained queries about cut procedure. The designed and developed to meet the requirements of a fast
fifth set of questions pertained to the software. The and reliable information system for the user in order to
software must be failsafe and at the same time it must be improve significantly the capability of any department
extremely user-friendly [1]. The final two questions were dealing with finances.
about the requirements. While developing the software
great pains were taken to ensure the integrity of the data. The application software for GFPS is developed for
carrying out detailed system study and analysis of finance
A set of questionnaires were checked in detail to assess department books. The developed package is an
the opinion of each member of the evaluation team about integrated system, which would ultimately take care of
the developed system. Users’ response for the first five most of the aspects of finance procedures. The emphasis
questions shows that the developed system was easy to has been laid to develop a structured system, which is user
learn and use, imparted a feeling of high level of friendly, easy to handle, easy to use and covers almost all
confidence. Users found that the GFPS utility was highly the essential aspects of expenditures in respective
useful. Salient advantages of this system are: (1) provides departments. The effort is aimed at producing software
enhanced access control and monitoring in real time, (2) is that is functionally acceptable, quickly adaptable, highly
more robust and reliable, (3) gives faster access to data, reliable and most efficient in processing. It is easy to
(4) exhibits a better level of financial procedures being less handle, simple to operate while economical to maintain.
dependent on human skills/failings, (5) always generates
true results of cut financial routine, and (6) presents The GFPS has automated the record of expenditures for
economy of force (lesser number of persons required). codes, expenditure, cut, posting and system functions.
The complete details of requested expenditure with
The developed GFPS system is efficient in processing. It respect to particular diary number within a year have been
has solved the data handling and storage problem of the automated.
financial data in the department. It can provide quick
answers to single as well as multiple queries quickly. It also Each department’s request can be recorded and achieved
has the capability to provide on-line information retrieval independently using GFPS. Project authorization on day
and automated report generation for the users. as well as weekly basis, authorization number,
authorization date and amount authorized is completely
The developed system is quite user friendly, so that any processed. Project releases on day as well as weekly
person can obtain the required information effectively out basis, released number, released date and amount
of the database, after few weeks raining and practice. released is completely recorded. The reports have been
Furthermore, self explanatory menus will keep guiding the designed on standard format based on specific queries. A
user. set of standard queries has been identified with a complete
support built in the system. Security is of paramount
Conclusion importance regarding the finance department daily routine
matters with respect to expenditure. It carries top priority
The developed GFPS system creates an environment, once it comes to the data handling of the department.
16
ENGINEER PEC September 2007
Keeping its significance in view, GFPS is equipped with 8. Date, C. J., “An Introduction To Database Systems”, 6th
necessary security features to deny access to Edition, Addison Wesley Publishing Company, 2000.
unauthorized intrusions and thus keeping away any illegal 9. McFadden, F. R. and Hoffer, J. A., ”Modern Database
attempts. Management”, Benjamin/Cummings Publishing
Company Inc., 2002.
Further research can be made on rules of finance 10. Ricardo, CM. “Database Systems, Principles, Design
allocation as they may change from time to time and a and Implementation”, Macmillan Publishing Company,
detailed reporting mechanism can be established. The New York, 1998.
software development work can be undertaken in future to 11. Visual FoxPro 8.0, Complete Command reference
further enhance the features of GFPS, in connection with with tutorial, 2003.
the computerization plan of finance department. It can be
established as short-term or long-term plans. About the Author
PEC Registration No. Elect/5228
GFPS has been thoroughly evaluated by financial experts
who tested it on real-time financial projects. It remained Dr Muhammad Younus Javed did his
under trials for four weeks. It has provided promising PhD (Adaptive Communication
results and all the users have found it extremely useful, Interfaces) from University of
highly reliable and accurate, very secure, user-friendly, Dundee, United Kingdom in 1991
very fast and excellent financial management system. and MS (Disambiguation Systems)
from the same university in 1988. He
References completed BE Electrical
Engineering from UET Lahore in
1. Somerville, I., “Software Engineering”, Addison - 1982. He is serving in the College of Electrical and
Wesley Publishing Company, 5th Edition, 1996. Mechanical Engineering (C of E&ME) since 1991 and has
2. Kroenke, D. M., “Database Processing Fundamental taught a number of courses at undergraduate and
Design and Implementation”, A Simon & Schuster postgraduate level. He is currently Head of the Computer
Company, 6th Edition,1998. Engineering Department at C of E&ME, National
3. Robinson, B. and . Prior, M., “System Analysis University of Sciences & Technology, (NUST), Rawalpindi.
Techniques”, International Thomson Publishing Five PhD scholars are working under his supervision. He is
Company, 1995. recipient of ORS Award from the University of Dundee for
4. Gruber, M., “Understanding SQL”, BPB Publications, his outstanding PhD research work. His areas of interest
1990. are Digital Image Processing, Operating Systems,
5. Shepherd , J. C., “Database Management, Theory and Database Systems, Algorithmics and Communication
Application”, 1990. Interfaces. He has 78 national / international publications
6. Rishe, N., “Database Design”, RR Donnelley & Sons to his credit. Mr Munawar iqbal is student of MS Computer
Company, 1992. Engineering at NUST and is presently pursuing Thesis
7. Jennings, R., “Using Access 95”, 1997. work under the supervision of Dr Younus Javed.
17
ENGINEER PEC September 2007
18
ENGINEER PEC September 2007
3. Chemical stabilization using additives. inelastic range. The location of all components, which are
4. Dewatering systems. likely to be damaged, should not affect gravity load
capacity of the structure. All other components remain in
Dynamic motion the elastic range. The design force level depends on the
first yield level of structure when deviations start from the
Structural dynamic is applied to calculate stresses and plastic response. Modification factors prescribed further
deflections. In earthquake, the loading is time varying and reduce the design force level. Seismic design of structural
maximum values are worked for structural design. Simple steel system covers moment resisting frames, simple
structure system is represented in terms of single degree braced frames and eccentrically braced frames. The
of freedom, which ultimately leads to multiple degrees of ductility of steel reduces yield strength and therefore, its
freedom. Dynamic equilibrium is derived from static limits lower than 50 Ksi is prescribed in the code for
equations that the applied force is equal to stiffness structural components during the design earthquake. The
resistance and resultant displacement. In case of dynamic other components are expected to yield during the strong
equilibrium, a time varying force (force multiplied by time) earthquake.
and its mathematical solution derives formula for
calculating the design parameters. Time dependent force The first system consists of moment resisting frames of
on a simple structure (single storey) the assumptions are steel columns and beams are bolted, riveted or welded at
made: - joints. This system is most ductile and is preferred for
1. Mass at roof level earthquake areas. Beam to column connection and panel
zone carries paramount importance. All connections
2. Roof system is rigid
should be strong, stiff (rigid) and having post-yield
3. Axial deformation of column neglected. deformation capacity without loss of strength. Reinforced
connections having cover plates, welded flange plates,
The base motion is product of mass and ground triangular haunches, strait haunches and vertical plate ribs
acceleration. The earthquake forces are classified into are used. A beam-to-column panel zone flexible
harmonic and impulse types. The harmonic loading component of steel moment resisting frame is to be
consists of train of sinusoidal waves having given catered for local stresses generated and strengthened
amplitude, while impulse loading are of short duration, according to design procedures. The second system
having impulses of different shapes. The seismic design consists of simple braced frames, which provide lateral
forces are calculated by two procedures: The equivalent strength and stiffness against earthquake forces and wind.
static force procedure and dynamic analysis. The static The philosophy of bracing is that the failure occurs only in
force procedures are based on empirical formulas and are braces, leaving the columns / beam connection
commonly used for regular structures having uniform undamaged; thus structure survives earthquake without
distribution of mass and stiffness. For irregular structures, losing gravity-load resistance. Beams and column in
dynamic analysis is used. Under the code regular braced frames must be designed to remain elastic when all
structures are up to 240 feet height and irregular structures braces reach maximum tension or compression capacity.
are 65 feet or less. Above these heights, for poor soil The third system consists of a mixture of moment resistant
pressures and earthquake greater than 0.7 seconds frame and braced frames having benefits of ductility
period, the dynamic analysis is required. The design base derived from first system and energy dissipation from the
shear is directly proportional to the seismic importance braced frames. The loads in the braces are transferred to
factor, soil condition factor at site and seismic dead load column or another brace through shear and bending in
and inversely proportional to fundamental period of the segment of beam. This small beam (link) is designed to
structure and ductility / strength factor. The design shears dissipate the earthquake-induced energy. All other
is not to exceed or decrease the limits under the code. The components of system are designed to remain elastic
Seismic zone factor (peak-ground acceleration) has to be during the earthquake.
scaled from seismic zone map and range from 0.075 to
0.4. The importance factor is for margin of safety, Reinforced Concrete Structures
especially hospitals and fire-brigade station buildings and
range from 1 to 1.25. The building period is directly Reinforced concrete is widely used in construction industry
proportioned to a fixed factor depending on steel or and experience shows of last few decades that buildings
concrete frame (range .02 to .035) and height of building. are designed after finding out expected demands
Structural system coefficient depends on ductility and matching with capacity in earthquake areas.
strength of system.
The ground motion and structural parameters are worked
Steel Structures: out and consist of structural fundamental period, yield
levels, and force displacement characteristics. The
The ductility of steel makes it ideal for seismic design. It demands have been worked out from shaking tests and
has strength and toughness but what is more important is performance of structure to actual destructive earthquake.
welding and riveting. Structural members are designed as The structural engineer, apart from normal design has to
fuses and detailed to dissipate earthquake energy in the take a great care of ductility or inelastic deformation
19
ENGINEER PEC September 2007
Shear Walls
Hinging Region from the Anchorage with hooks
face of the column The structural wall reduces inter-story
Loads damage during strong earthquakes.
Simple walls with height / width ratio
i. Static: One direction, in increment until deformation. limited to 2.0 are common in multistory
ii. Reverse: Loading cycle in predetermined amplitude buildings. In the cantilever walls
until deformation. horizontal and vertical steel is
iii. Dynamic: Time varying displacements are applied to provided and resists all shear and
selected points of structure. moments.
iv. Shaking Tables: Computer – control actuators are
used for input already worked out. A horizontal force acts at some
distance above the base, causing
Effective lateral confinement of concrete increases flexure hinging at the base of the wall.
strength of concrete and deformation capacity, lateral ties The walls are designed so that as to Section of the
or spiral steel, covered by thin concrete confines concrete yield at the base. The horizontal force wall at the base
and increases ductility. Rectangular hoops are weak at distance above the base is of
corners and therefore, not as effective as spiral steel for importance. In case it is higher above the base, it will take
members subject to axial loads. Flexure deformation lesser flexure hinging force in comparison to nearer
capacity of hinge is closely related to curvature at that position at the base. Dynamic analysis of shear walls show
section. The curvature varies over the length of “Plastic that maximum shear calculated at the base of the wall can
Hinge.” Beams and column joints critically stress and go 3.5 times greater than shear needed to produce flexure
beams design near intersection is of particular interest. yielding at the base. The shear depends on fundamental
These potential hinging regions are provided with spiral time period and rotational ductility of the wall. Further, it is
and lateral ties for earthquake areas. The lateral steel in assumed that the hinging region where destruction occurs
hinging regions of beams confines the steel, resist against is roughly an equal to thickness of the wall. Shear walls
buckling and works against transverse shear. Further, it having stiff and well-confined flanges or boundaries
should be insured that the beams develop their full (column) are better than plan rectangular sections. Where,
strength in flexure rather than the shear. geometry changes along the height of wall, special
confinement steel is provided. The designs of coupled
In column design, it has to be insured that the failure of the walls are used instead of simple shear walls. The walls are
frame should not occur in column. Plastic hinging should coupled by beams and the beams serve as primary unit to
occur in the beam and thus column collapse is saved. The absorb shock and save the structure. In reinforced
strong column – weak beam practice is intended to insure, concrete design, the provision of ASCE-95, IBC-2000,
20
ENGINEER PEC September 2007
1.4D+1.7L+(1.7H or 1.4F)
0.9D+(1.7H or 1.4F)
0.75 (1.4D + 1.7L + 1.4T)
Where
U = Required Strength.
D = Dead load.
L = Live Load.
W = Wind Load.
E = Earthquake Load.
F = Load due to fluids.
H = Load due to soil pressures.
Plan Elevation T = Load due to temperature and
shrinkage
UBC-97 and ACI chapter 21 are used. 7. The equations are given to give an idea that to what
extent the earthquake affects the design, but in actual
A horizontal force acts at some distance above the base, practice there are variation in different codes.
causing flexure hinging at the base of the wall. The walls 8. The code limits the concrete strength to 3000 lhs /in2
are designed so that as to yield at the base. The horizontal and maximum yield strength of steel to 60,000 lbs. /in2.
force distance above the base is of importance. In case it is In no case over specified steel be used in beams as it
higher above the base, it will take lesser flexure hinging effect plastic hinging at the ends and the shear
force in comparison to nearer position at the base. strength of beam gets lower than the moment capacity.
Dynamic analysis of shear walls show that maximum 9. The beams section should be with width / depth ratio of
shear calculated at the base of the wall can go 3.5 times greater than 0.3. The width should be more than 10
greater than shear needed to produce flexure yielding at inches and equal or less than width of supporting
the base. The shear depends on fundamental time period column with the bearing, 1.5 times depth of beam.
and rotational ductility of the wall. Further, it is assumed Laps should not be within 2 times depth of beam near
that the hinging region where destruction occurs is roughly the ends. Hoops should support longitudinal bars
an equal to thickness of the wall. Shear walls having stiff firmly. The shear force in concrete should be neglected
and well-confined flanges or boundaries (column) are for design.
better than plan rectangular sections. Where, geometry
changes along the height of wall, special confinement steel References
is provided. The designs of coupled walls are used instead
of simple shear walls. The walls are coupled by beams and 1. Seismic design handbook by Farzad Naeim.
the beams serve as primary unit to absorb shock and save 2. NEHRP guidelines for seismic design of buildings.
the structure. In reinforced concrete design, the provision 3. Recommended lateral force requirements and
of ASCE-95, IBC-2000, UBC-97 and ACI chapter 21 are commentary (1999 SEAOC bluebook)
used.
About the Author
Principal Steps
Junaid Sultan Khan PEC Registration Number: Civil/
1. Earthquake forces, base shear and estimated 21813, Bachelor of Engineering (2001) Major in Civil
fundamental period of vibration of structure are Engineering, from University of Engineering and
calculated while distribution of shear over the height is Technology, Peshawar, N-W.F.P, 1ST Division throughout
estimated for the design. Engineering University. Did final project on Design of
2. The design forces and story drift ratio are calculated Flexible Pavement of the Peshawar-Islamabad Motorway
on basis of base shear, gravity and wind loads. (M-1). It was based upon American Association of State
3. All the member and joints are designed for most Highway and Transportation Officials (AASHTO), Road
unfavorable conditions to insure ductile behavior in Note 29, TRL Road Note 31 (For Tropical Countries)
each principal direction. Codes. Including a brief over view of Motorway Economic
4. For all buildings over 24 stories, dynamic analysis is study. Completed first semester of Master’s in Structures
warranted under the codes. from University of Engineering and Technology, Peshawar,
5. Ultimate strength methods (strength design) are used N-W.F.P and Master’s will be completed in the start of
by adopting load factors, reduction factors and 2007. Working as a Junior Engineer (J.E) with “Associated
combination, according to design codes. The required Consulting Engineers (From July 2003 and still working).
strength is based on the most critical combination of Worked as Engineer with Creative Construction Company
factored loads and capacity. (September 2001 to July 2003).
6. A.C.I code requires the strength:
1.4D + 1.7L
U = 0.75 [1.4D + 1.7L ± (1.7W or1.87E)
0.9D±(1.3W or 1.43E)
21
ENGINEER PEC September 2007
Hydro-Energy and Water Vision in Pakistan survival, at least, requires the reversal of this ratio. If
exploited properly, even in the existing (Tarbella, GBHP
Engr. Abdul Qayyum Project, Mangla) arrangement, with the introduction of
pumped storage and generation, the annual power
Introduction shortages can be greatly minimized if not eliminated.
Tomorrow belongs to hydro energy. There are three Regulated water releases are permitted through all the
naturally compatible types of hydro power (Fig. 1); main hydel power plants in Pakistan. Capabilities of
Tarbela, Mangla and Barotha remain as 760 MW (load
a. Impoundment like Tarbella and Mangla. factor= 21%), 400 MW (load factor = 40%) and 580 MW
b. Diversion (load factor = 40%) against the installed capacities of
3478, 1000 and 1450 MW in winter. The balance of
like GBHP Project and, c. Pumped Storage. Pakistan is installed capacity in winter and peak demand throughout
well suited for all the three hydro powers, and it, can meet the year is met through thermal generation. Power
its all present and future electricity requirements only by generation, especially after the present oil crises, oil fired
this inexpensive type of hydro-energy, due to its unique stations are the costliest among various thermal power
100% Impoundment hydro
1-Impoundment
20 to 30% wastage in pumping
favorable environment for them. With proper planning, it units. The thermal units also require to be shut down during
should be possible for Pakistan to export this type of hydro- annual maintenance.
energy. A careful study has shown that the total potential of
hydro energy in the world is not less then 15 billion MW. To meet the varying power demands, the provision of
Out of this, only 20% has yet been exploited and most of thermal and hydel mix of power stations (plants) is adopted
the unused and untapped hydro potential is in the under both for the improvement of load factor of the base plant
developed/developing countries. Pakistan is one of them. and the adjustment of the power generation to match the
daily and seasonal load fluctuation of the national grid. But
In financial year 2003-2004, the total generation in increasing the energy production by the present pattern
Pakistan was 68,987 MKwh, in which hydel component can not help reduce unit price of electrical energy. The
was only 27,358 MKwh (39.6%) and the thermal most reasonable means to increase the productivity of
component was 41,629 MKwh (60.4%). In 2004-2005 the plants or decreasing the unit cost of energy in Pakistan is
total generation was 73,000 MKwh, in which the hydel the use of pumped storage plants and generation (Fig 2 &
component was 25500 MKwh and the ratio of hydel to total 11). When the load enters in base phase (Fig 7) of the plant
was further decreased to 0.349. Pakistan’s economical or when productivity is less due to limited water flows,
24
ENGINEER PEC September 2007
It will be seen from the figure that the load fluctuation for the
base plant has been considerably reduced. Also there is a
bulk transfer of energy from the low-demand period to
peak period. The pumped storage plant assists the
network in two ways (1) It improves the load factor during
the low-demand period, benefiting the network and (2) It
reduces the demand on the base plant by generating peak
power making it possible to use lower capacity units.
25
ENGINEER PEC September 2007
Constitution
26
ENGINEER PEC September 2007
27
ENGINEER PEC September 2007
In 1999, EU had 32 GW capacity of pumped storage out of over from one mode of operation to another mode.
a total of 188 GW of hydropower and representing 5.5% of These features help the network in efficiently meeting
total electrical capacity in the EU. A worldwide list of some sudden peaks and shock loads. The set can do
pumped storage plants may be seen at Annexure-1. spinning reserve duty at a very low cost, compared to a
thermal set. (Presently used in Pakistan).
Cycle efficiency of a pumped storage plant d. In Pakistan unutilized capacity in winter at Tarbela, and
Ghazi-Barotha and even at Mangla can be activated at
The cycle can be divided into two portions the pumping very low cost along-with meeting the peak demand by
cycle and the generating cycle. While pumping, losses will hydropower. This provision should be considered in
be incurred in the transformers, motors, the pumps and the the feasibility of all future plants at Indus and Jhelum to
penstock pipes. While generating, losses will be incurred increase their load factor.
in the penstocks, the turbines, the generators and the
transformers. Because of these advantages, a pumped storage unit of
100 MW in U.K. was equated to a thermal unit of 120 MW,
The efficiencies of the machines are given below:- when the preliminary estimates were prepared. These
Transformer - 98 per cent days when new power plants are being planned, a
Motor-generator - 96 per cent provision for a pumped storage plant with a capacity of 15-
Turbine - 92 per cent 20 per cent of the thermal capacity is provided for. It is
Pump - 88 per cent found that a combination of a pumped storage plant of 500
Penstocks - 96-98 per cent (depending upon MW capacity along with a thermal plant of 2000 MW
the length) capacity benefits the network more than a thermal plant of
2500 MW capacity.
There are 20 - 30 percent losses, therefore, the overall
cycle efficiency obtained ranges from 70 to 80 percent. Scenario in Pakistan
That means for every 3 to 4 MW drawn from the network
during off-peak period and throughout the winter in Pumped storage generation in Pakistan has special
Pakistan, 2 to 3 MW are returned back to the network while attraction due to the reason that at major hydropower
about 1 MW is consumed and may be considered as plants almost 71% of their capacity (4200 MW) remains
waste. unutilized during winter season. Load factor lowers down
up to 3% on some days. In other words the potential exists
Advantages of pumped storage plant much more than to fulfill the peak demand only. In deed the
present ratio of hydel to thermal production can be
a. The plant has a long life. Plants are giving efficient reversed by the use of this type of hydro energy by
service even after 25 years of operation. exploiting it in existing setup. (Fig 10(a-d))
b. There is reliability of operations. Outages are low and
maintenance costs are small. Pumped storage generation - scope in Pakistan
c. There is a great flexibility of operations. The unit can
be fully loaded from standstill within few minutes and it a. Pattern of demand
can be shut down quickly. There can be rapid change The demand for power fluctuates from minute to minute,
Table – 3 Daily Average with/without Pumped Storage Load Factor (LF) and the Generation Capabilities
LF/Capabilities
Present Accumulative with
Unutilized 75% of Pumped Storage
Plant Unutilized Capabilities
(Potential)
Capabilities LF
% LF %LF % LF (MW)
(MW)
28
ENGINEER PEC September 2007
Hydel/Thermal = 6463 / 10886 = 0.59 …….A Even if part of the net achievable 4271 MW, (average daily)
Ratio of capability in winter between hydel and thermal = is obtained additionally, from our existing hydel stations, it
1994 / 9431 = 0.21……….B will;
i. Increase the productivity of already installed hydel
Our emphasis is to increase both ratios A and B and this units by using their unutilized capacities
objective can be obtained by increasing the hydel throughout the year.
component both in summer and winter. ii. This arrangement will decrease the per unit
generation, capital as well as maintenance costs
For simplicity, the load factor of hydel component in winter many folds.(Fig-11)
may be taken as (Tarbela, Mangla & Ghazi-Barotha). iii. Make possible the best utilization of national
Capability in Winter / Installed Capacity = 1740 / 5928 = resources and reduction in production cost will
0.29 …………...C lead to real economical growth.
c. A statistical analysis of present scenario/scope in
Present average daily capability/installed Capacity = Load Pakistan is produced below.
Factor (LF) = 3002/5928 [Table 1 & 3] = 0.51……… … D
Fig 2 shows the relation between the unit cost and the load
Capacity to be installed in MW = Installed Capacity factor of a plant. Fig-11 depicts that the present cost of
/Average Load Factor (D) = 5928 / 0.51 = 11623 MW. production at the three plants in Pakistan can theoretically
be decreased more than fifty percent of the present cost by
In other words to get 5928 MW effectively, in the utilizing pumped storage hydro energy. As in the
conventional manner, we have to install 11623 MW, which conventional design of future plants at Indus/Jhelum, the
is extremely expensive. load factor cannot be increased to an acceptable value, the
Table - 4- Daily Average with/without Pumped Storage Load Factor (LF) and the Generation Capabilities
(With two Future Plants)
Average Load Factor Load Factor with Average Capability Average Capability
in Conventional Pumped Storage in Conventional with Pumped
Plant
Method % % Method MW Storage MW
29
ENGINEER PEC September 2007
provision of pumped storage be considered. Thus, it emerges that during the year, the unutilized hydel
capacity of existing plants can be used in pumping and
Table-3 depicts, both, capabilities/load factors of all the future hydel plants can be designed in conjunction with
main existing plants, individually and when combined pumped storage generation so that the maximum hydel
together. component is achieved. (Table-1 to 3, Fig 10 (a-d))
For Pakistan, we find that through the conventional Planning for the Future
(without increasing the load factor by use of pumped
storage generation) design/ construction of hydro/ thermal “Prior planning prevents poor performance”. It should be
plants. There seems no hope to meet our energy possible to think in term of international super grids in the
requirements in an economical way. Present/ Future future for which a number of countries may cooperate with
average scenario of load factor/ generation/ capabilities is each other to make the best use of the different resources
shown in Table-4. available for power generation. Example is the EU, which
is getting the benefits of cooperative efforts in the
Present Load = 8000 MW integrated thermal, nuclear and hydel power stations.
Load in 2016 at the increase of 400 MW/ year = 12000 MW There should, therefore, be no hesitation to
Above discussion leads to the following conclusions change/improve our present stations of = 60% load
i. Without Pumped Storage; factor and design future plants having load factor > 80%
Total average daily generation (in year 2003-2004) in throughout the year. For this purpose; paras 3 & 4 in view,
Pakistan 189.00 Mkwh presently, at Tarbela (Figure-9) we have;
Average daily hydel generation 71.23 Mkwh
Ratio between Hydel and total generation 0.376 a. High Level Reservoir (Tarbela) with,
ii. With pumped storage only at Tarbela: i. Maximum conservation level - 472.41 m.
Average daily hydel generation 4479 /1000 x 24 Mkwh ii. Crest of Main Dam - 477.90 m.
= 107.49 Mkwh b. Low Level Reservoir (Ghazi) with,
Ratio between Hydel and total generation = 0.568 i. Maximum conservation level - 341.50 m
iii. With pumped storage at all the three existing plants ii. Crest of Barrage - 342.00 m
Average daily hydel generation 128.16 Mkwh iii. Live storage capacity - 60.20M. m3
Ratio between Hydel and total generation 0.678
iv. Tarbela 4th extension- By providing reversible
Pumped Storage generation in the future extension 4
project, we can get further 960 MW which is equivalent
to 23.04 MKwh.
v. Changing the present conventional design of Kala
Bagh Dam plant to the mixture (55% conventional +
45% reversible pumped storage) the total average
generation can be increased to 76.68 MKwh.
= (3600x0.55) + [(3600x0.45) x 0.75]
= 1980+1215=3195 MW
Daily average generation = 76.68 MKwh
Total hydel daily generation = 151.2+76.68= 227.88
MKwh
vi. Changing the present conventional design of Basha
Dam Project to the mixture (55% conventional+45%
reversible pumped storage)
Total average hydel increase= (4500x0.55)
+[(4500x0.45)x0.75] = 2475+1518.75 = 3994 MW
Daily average generation = 95.86 MKwh
Total hydel daily generation = 227.88 + 95.86 =
323.74 MKwh say 324 MKwh
30
ENGINEER PEC September 2007
At present the average daily capability of Tarbela is about storage plants should be taken care of through proper
1700 MW due to low reservoir and average daily feasibility studies and reports.
generation is 41 Mkwh. By installing pumping we can Upper
enhance the average daily capability to say 3174 Mw
where as average daily generation can be increased from
reservoir
41 Mkwh to 83.4 Mkwh. Load factor of the system will
increase accordingly. Hence Tarbela can be upgraded in
two phases. In first phase only pumping upto 1500 MW is
suggested and in 2nd phase extension 4 of Tarbela be
carried out by installation of reversible units. For 100 Generating
cumecs of pumping nearly 192 MW motor is required at
Terbela. Experts services are available in the market.
Pumping
Even for Mangla and Barotha powerhouses, it appears Lower
feasible that by installing the pumping arrangements and reservoir
providing suitable downstream ponding weirs, the hydel
capability can be increased to 5340 MW and average daily
hydel generation can be enhanced to 128.16 Mkwh. A
proper feasibility study should be carried out.
Pumped storage
Construction of future dams through conventional design, power plant
method /systems at Indus/Jhelum rivers cannot increase
the load factor, and hence, it cannot decrease the unit cost
of generation. Therefore, there is pressing need that Figure 6 Pumped storage scheme configuration
conventional design be changed, and about 45% provision
of the pumped storage generation be incorporated in all
the future plants. Pumped storage stations can adopt a number of roles
within the operation of an electrical supply grid, and can
perform some of these roles concurrently. It is common for
Other Requirements / Implications
the operation of pumped storage plant to vary over time as
they are to respond to changing market conditions.
This is a Concept Paper and, the other important aspects
(Annex-2)
such as type and working of plant, site selection, lake
classification / machinery and power house for pumped
31
ENGINEER PEC September 2007
Recommendations
32
ENGINEER PEC September 2007
China
Ireland
Italy
France
33
ENGINEER PEC September 2007
Dychów, 79.5 MW
u
Russia
Taiwan
United Kingdom
Cruachan, Scotland
u
Dinorwig, Wales (1984), 1320 MW
u
Ffestiniog, Wales 360 MW
u
Foyers, Scotland
u
United States
Other
34
ENGINEER PEC September 2007
35
ENGINEER PEC September 2007
36
ENGINEER PEC September 2007
37
ENGINEER PEC September 2007
About the Author T/Lines) passing through difficult and weak soils. By dint of
his engineering judgement and optimised designed
Engr. Abdul Qayyum, presently working as Principal foundations, we saved more than Rs. 15 Million of the
Engineer Design structures in GC, M.Sc. in Structural Department. Remedies regarding site problems were also
Engineering from UET Lahore and Advanced Structural advised by him through frequent site visits.
Engineering from USA is author of four Research Papers
presented as follows: July 1998 to August 2002.
Structural Behaviour of Light Weight Concrete at the Joined Pakistan Hydro-Consultants for the supervision of
Annual Convention of American Concrete Institute in 1989 Ghazi Baortha Hydro-Project.
at Atlanta (USA) February 18 – 21, 1989.
Worked as Assistant Resident Engineer Structures from
Structural Engineering and Construction published in the July 1998 to December 1999.
proceedings of Second East Asia Pacific Conference on
Structural Engineering and Construction held on 11 – 13 Worked as Assistant Resident Engineer Earth Works from
November 1989 in Thailand. January 2000 to October 2000.
Concept Paper on Hydro-Energy and Water Vision in Worked as Claim / Contract Engineer from November
Pakistan, Introduction, Scope / Future Planning and 2000 to December 2002.
Recommendations presented in IEP seminar on 1
February 2006 in Lahore. Joined Mangla Dam Rising Project Joint Venture
Consultants. (January 2003 to August)
(Revised) Hydro-Energy and Water Vision in Pakistan –
“Concept Paper for Pumped Storage & Generation” in a Worked as Principal Engineer Design Structures.
Seminar at WAPDA Auditorium Lahore on July 22, 2006.
Joined General Consultants WAPDA Vision 2025
Experience June 1981 June 1998 Programme.
The officer worked in WAPDA Design T&G (Transmission Worked as Contract / Tender Documentation Engineer
Lines and Grid Stations Now NTDC) from dawn to disk from August 2003 to May 2004.
over and above the call of his duties and met targets
assigned to him. Working as Principal Engineer Design Structures from
May 2004 to date.
In August 1994, M.D. (T&G) assigned him the challenging
task of protection of two 220 kV D/C T/Lines between The officer has state-of-the-art knowledge, hardworking,
Mangla – Ghakkar being in very vulnerable condition when commitment to his profession and fully confident in his
no WAPDA officer was accepting the challenge. The officer approach which helped a lot to higher authorities in taking
took strong cognizance of the situation / site parameters crucial engineering decisions to save the costs.
and proposed very timely, economical and effective
remedial measures for protection of Sakator Nalla As recognition of his above meritorious services, the
peripheral foundations. Recognising his efforts, M.D. officer was strongly recommended for first prize in 1995-96
(T&G) issued him an appreciation letter. & 1996-97.
38
ENGINEER PEC September 2007
Frontiers of Science and Engineering engineer in UK in 1994. By now in 2006 the women
scientists and engineers are executing all the national level
Entail Women Scientists and mega projects as sole responsible officers in almost all the
Engineers countries. According to US vision of the engineer 2020 [2]
and new century engineering programs for women [3] the
* world population will increase to 9 Billion by 2020 out of
Dr. N. Khan, Z. Saleem , A. M. Chaudhary, A. which some 8 Billion will reside in South East Asia so we
M. Mirza need to train women to cope with the impending economic
stresses.
Abstract
National Academic Press (NAP) publications and others
This work reviews some of the major achievements of elite [2-11] have focused existing generic and future potential
women scientists & engineers and explores the unique
frontiers in science and engineering where probably
women naturally suit better than men. There are several
frontiers in science and engineering that have to do with
ultra-short time scales such a nanotechnology and sub-
attosecond events; ultra-large large scale system such as
information technology and telecommunication; and ultra-
complex scale systems such as biotechnology and neural
networks. Theses frontiers have to merge environmental,
life, and applied sciences for stunning new unexplored
possibilities. Research and exploration needs patience
and continued hard work that entails women full
participation in all programs. Natural forces of this world
are forcing faculty and students to work together across
traditional disciplinary boundaries. This is the world of
energy, environment, biotechnology, complex
manufacturing methods, product development, logistics
and communications. These frontiers address some of the
very scary challenges to the future of the world. There are
many compelling reasons for opening the doors, removing
the barriers, and encouraging the full access participation
of woman wisdom in all fields of science and engineering
as researcher, educator, sales engineer and project Fig.1 NAP free online books on woman
manager. (Courtesy of National Academic Press).
Keywords
issues of women scientists and engineers. Few samples
Women education, Women scientists, Women are shown in Fig.1. It is important for Moslem countries to
engineers, Minority education. let the women share its responsibility in national
development.
History of Women Scientists and Engineers
In fact, Moslem women due to combined impact of religion
It matters little who was the first woman scientist or and culture are not being allowed enough opportunities
engineer; however, it matters if one deems women not with full access. Responding furiously elite educated
equivalently intellectual as the men. In certain cases Moslem women even accuse men as unprepared,
women have proved even to be superior researchers and unwilling and unfit for era of information technology [4].
innovators than the men i.e. Madame Marie Curie [1] won However, it is local issue that is evolving as self sustaining
noble prize twice, first in physics and later in chemistry. It is revolution in Moslem countries and is likely to make its own
what men scientists or engineers could not do to date. First way. Women involvement in science and technology is
women who got engineering degree in UK is Alice since the start of history. Frontiers of science and
Jacqueline Perry who graduated with a first class honors engineering research have become too entangled and
degree in Civil Engineering from Queen's College Galway complex [5]. I believe the furtherance in research now
in 1906 and Nina Cameron Graham who graduated at requires full women participation in science and
Liverpool University in 1912. Women engineers due to engineering to connect up the missing links to synthesize
domestic pressure did not practice but now they do. First the realism of nonlinear nature. Some of the most famous
woman was appointed as government chief highway earlier women scientists and engineers are shown in Fig.2.
40
ENGINEER PEC September 2007
(Courtesy of http://www.rice.iit.edu/engineersweek/timeline.htm) her part but Asian woman need to transform herself from
shy lady into a professional engineer or scientist. Who likes
to be the first Moslem woman Nobel Laureate? Women
journey from dark ages to full participation level is the sun
way lagoon. Marie Curie obtained Nobel Prize twice; firstly
in chemistry (1903) and secondly in physics (1911). Her
daughter, Irene Curie, also got Nobel Prize in chemistry
(1935). Females have proved their worth by obtaining
Noble Prizes in all disciplines including literature (8),
Sciences (10) and Piece (11). In fact woman is considered
a symbol of piece in all the cultures. Percentage of women
Nobel Laureates in different disciplines is shown in Fig.3.
40
Fig.2 Some well known woman engineers and inventors. To author’s perspective if an innocent girl (Lise Meither)
can be mother of atomic bomb then what the individuals
Hypatia was the first Egyptian woman mathematician and prove by raising discrimination barriers on their way.
philosopher who developed the hydrometer to measure Today’s woman is Master of Science and can do as much
the specific gravity of fluids and an astrolabe to determine engineered job as the professional men of course. Women
position of sun and stars. She served as a great scientists such as L. Buck (2004), B. MaClintock (1983), R.
philosopher teacher in Alexandria University. L. Montalicini (1986), G. Elion (1988), R. S. Yalow (1977)
Fundamentalist Christian monks of Church St. Cyril killed and C. Nusslein (1995) have got Nobel Prizes in
this great woman in 415 [6]. Augusta Ada daughter of medicines; Marie Curie (1903), Irene Curie (1935), G. R.
English Poet Lord Byron is the first woman, tutored by Cori (1947) and D. C. Hodgkin (1964) in chemistry; Marie
famous mathematician Augustus De Morgin, who Curie (1911) and M. G. Mayer (1963) in physics; have track
developed computer programming skills like looping, record of excellence in innovatory, enabling and emerging
indexing along with binary system used by today’s fields of science and technology. In sciences they have
supercomputers. Margaret Knight developed paper demonstrated their capabilities by winning Nobel Prizes in
bagging machine and a rotary engine. Emily Roebling (civil Physics (2), Chemistry (3), Biochemistry (1) and
engineer) husband died and she continued his job to Medicines (5). Percentage of women Nobel Laureates in
supervise construction of famous Brooklyn Bridge in New pure or applied sciences is shown in Fig.4.
York. Madame Marie Curie extended human vision to X-
50
Percent of Nobel Laureates
41
ENGINEER PEC September 2007
Women have got enough excellence in the fields of too intellectual just to call attention of others with
sciences, especially medical sciences. Now they need to apparently rude and unladylike attributes. As a result of it
focus on other disciplines such as telecommunication, some other good inventing ladies could not get recognition
electronics engineering. Emerging and enabling of their truly acceptable attributes. Similarly, a black Negro
technologies suitable for women scientists and engineers woman E. Eglin developed clothes wringer but did not
may include photonics engineering, nanotechnology, patent in her name because white women will not buy it.
artificial intelligence, fuzzy logic and neural networks. The still waters are often unfathomable. Time has shown
Research requires devotion, patience, tolerance and an innocent mother surrounded by victims of her atomic
endurance that are the unique features of women wisdom. Although, same knowledge can be often used for
community. They have demonstrated their research destructive purposes but we do not believe Lise Meither
capabilities by inventing telescope (S. Mather: 1870), wanted her wisdom to end up as shown in Fig.5.
washing machine (M. Colvin: 1871), sewing machine (H.
Blanchard: 1873), anti-pollution device and noise absorber She would have cried exactly as the real mothers of these
coating (M. Walton: 1879), ice cream freezer, hair curler children seeing the after affects of her wisdom after US
and air pump (B. L. Henry but nick name Lady Edison: nuclear attack on Heroshima and Nagasaki in Japan.
1887), elevator safety (H. Tracy: 1892), syringe
(L.Geer:1899), radioactivity and X-rays (M. M. Curie: Generic Issues in Science & Engineering
1903), engine (M. Knight: 1904), refrigerator (F. Parpart:
1914), electric heater (I. Forbes: 1917), invisible glass, Career-related statistics for women in academe can vary
antireflection coating, artificial raining (K. Blodgett: 1917), greatly across scientific and engineering fields. Some of
permanent wave machine for hair dressing (M. Joyner: this variability is related directly to issues that are of a
1928), atomic bomb (L. Meither: 1939), jam proof radio particular nature: the public image of a specific field; its
communication system (H. Lamarr: 1940), telephone visibility to science and engineering majors as a career
switching system (E. S. Hoover: 1954), tunable dye laser opportunity; the demand for it in the private sector; and its
(M. Spaeth: 1964), polymers, optical fibers, kevlar, bullet distribution among the academic programs of doctorate-
proof vests, radial tires and airplane fuselages (S. L. granting universities. These issues are perhaps of lesser
Kwolek: 1965), correction fluid (B. N. Graham: 1956), importance than the broad, generic issues that affect most,
antifungal and antibiotic (R. F. Brown: 1957), petroleum if not all, career patterns of women scientists and
fuel and gasoline (E. M. Flanigen:1958), drinking fountain engineers who choose to work in higher education. It is the
device (L.O’Donnell: 1985), cancer drugs and kidney generic issues that interventions are expected to address
transplant (G.B. Elion :Nobel Laureate: 1988), Barbie doll first and foremost. Given the persistent, low percentages
and breast prosthesis (R. Handler: 1995). of women who become tenured on science and
engineering faculties, despite enlargement of the pool of
Besides it women scientists have developed cancer drugs, female applicants for entry-level appointments, the
pain relievers, security system and wave machines. The tentative conclusion can be drawn that the "glass ceiling"
first woman patent was registered in USA in 1809. Woman operates at the associate professor rank in most research
scientists and engineers patents registration rate was universities [2-5].
about 1% by 1888 that has increased to 6% by now [7-9].
However, according to Marry Ruthsdotter, director Most of the recent literature on career patterns of women
Women’s History Project, some women in West after death scientists and engineers reviews the perennial issue of the
of their husbands started projecting themselves seeming apparent conflict between the demands of motherhood (or
other familial obligations) and those of the profession. This
conflict has taken an especially acute form in the context of
academe because of the requirements for tenure.
Recognition of the "biological clock" and, more generally,
of a faculty member's familial obligations is still treated as a
variance to normal professional activity instead of as an
integral part of it. These three generic issues do not
exhaust the tableau of problems that face women who
choose careers in academe to do teaching and research in
scientific or engineering fields. But they do surface
repeatedly in a number of recent self-evaluations
undertaken by major research universities to assess the
academic environment for women on science faculties.
42
ENGINEER PEC September 2007
sharply as they advance through their careers. The monitor student progress to assess why women scientists
resulting isolation impedes research, increases stress, and engineers loose interest in the discipline. Specific
and may lead to abandonment of a scientific or funding sources should be targeted at women to attract
engineering career. The period when successful scientific them to applied science and engineering. Comprehensive
or engineering careers are usually forged corresponds to interventions should be targeted toward women and
the period of childbearing. Experimental work, which implemented in diverse institutions to attract more female
makes extraordinary demands on availability in time or students. The research based on interventions for women
location, raises conflicts with the family responsibilities that in science and engineering at the undergraduate level
continue to be disproportionately borne by women. should be expanded by funding longitudinal evaluations of
Women graduate students are often dissuaded from selected programs. Newer models and strategies should
pursuing certain areas of science. In some disciplines they be developed, evaluated and revised where necessary for
are discouraged by faculty and student colleagues from involving faculty members in strategies to increase the
pursuing mathematical or theoretical investigations; in participation of undergraduate women in science and
other fields women are discouraged from pursuing engineering.
experimental work [2-5].
Graduate and Postdoctoral Initiatives
Women on Frontiers of Science & Engineering
To promote graduate education of women in science and
We cannot succeed on many critically important policy engineering requires a lot to do such as confidence
matters without the full participation of women and building or financial prosperity aspects need to be
minorities, in both the development and the support of awakened in women graduate students to gain scientific
effective policy and action. The fraction of working women expertise and effective communication skills to go forward
participating in the scientific and engineering work force is in careers in science and engineering. To retain graduate
smaller than that of men. However, as the need for students in the sciences and engineering, departments
scientists and engineers increases for the R&D enterprise, and institutions must develop programs of positive
women should find greater opportunities to pursue careers incentives for faculty. For instance, initially proportional
in these fields. Nonetheless, to increase women's seats may be reserved for women researchers. The level
participation in science and engineering, many barriers playing field concept for women graduate students must
must be overcome. HEC has several important roles be articulately and concretely demonstrated by upper
related to these challenges. One of these roles is to inform management of the academic institution. University
both the science and engineering community and the management should consider women graduate student
public of the need to increase the participation of women in problems such as child bearing/rearing issues and
scientific and engineering careers—to increase not only personal family issues of talented females. If such facilities
economic competitiveness but also educational and are not provided to the female candidates then they will
occupational equity. Three important factors have look for alternate options giving above facilities. Resolving
seriously been realized by the educators around the globe. issues related to balancing family and scientific career
goals for women graduate students must be a high priority
To examine a sample of interventions from the wide for any academic institution. Women at graduate and
spectrum known to have been established in the private postdoctoral level usually are married with family
and public sectors both men and women, in science and responsibilities. They need financial assistance to cope
engineering careers; To determine the characteristics with routine problems. Universities can arrange special
shared by programs considered to meet that objective; and pay package out of projects for female researchers to
to discuss methods of implementing such programs on a increase women involvement in science and engineering
broader scale. Finally, it heightened awareness of what [2, 5].
universities are doing to increase the quantity and quality
of students pursuing careers in the sciences and Graduate-and postdoctoral-level interventions aid the
engineering. We need to look for the practical strategies for process whereby individuals form the networks that lead to
increasing the participation of women in science and job opportunities, shared research and, ultimately, a sense
engineering—at the undergraduate and graduate levels of of the possibilities, both personal and professional, in their
studies [2-3]. chosen fields of study. The percentage of women enrolled
in graduate science and engineering programs is on the
Undergraduate Study Initiatives rise in all fields except computer science and the social
sciences. Of some concern, however, is the lengthening
Senior educators and international expert reports time-to-degree of students pursuing doctorates in science
recommend increasing initiatives for escalating women and engineering. In all fields except engineering, women
participation in science and engineering at the tend to have longer registered time-to-degree and total
undergraduate level. Higher education institutions should time-to-degree, which is the total number of years, elapsed
43
ENGINEER PEC September 2007
between earning the baccalaureate and the doctorate, probationary period and that every tenure-review
including time not enrolled at a university. However, in committee has at least one senior female member as
most fields these differences are becoming minimal. youngster colleagues may have personal clashes with one
another. Universities may create family-friendly workplace
Experience indicates that successful programs at the environment by establishing flexible work schedules, job
graduate level of education are addressed to specifically sharing, and subsidized, proximate child care as standard
identified needs, demonstrate multiple linkages between features of campus programs for the faculty. Allow
graduate school and other populations, and are maximum flexibility in working conditions consistent with
characterized by substantial faculty or mentor carrying out responsibilities of teaching or research by
commitment. The processes by which men and women female scientists and engineers [2].
move through graduate school activities are not
necessarily the same; do we know in what ways they are A lot many females just abandon jobs due to strict timing
different? Initiatives and efforts that are not interventions in requirements such as reaching sharp by bus at 8 am whilst
a structural sense but nevertheless affect outcomes, for her own children a lot many females just abandon jobs due
example, student membership in professional societies, to strict timing requirements such as reaching sharp by bus
caucuses, associations, support groups, and coalitions. at 8 am whilst her own children go to school at 830 am. She
Systemic approach may alter institutions or its hard just can not come and cruel bosses start explaining without
settings to accommodate women scientists and understanding her issue. If a female director is appointed
engineers. A teaching fellowship training program that for female staff then she can ask to other heads or deans to
includes training on sensitivity to gender issues is an consider her issues and give job assignments in
intervention that can change the setting in which teaching accordance to availability. It is non sense to loose a
and research are done and in which the pursuit of careers talented female just because she can not reach at 8 am to
takes place. take a lecture. A mild policy may be to change her timetable
as per her convenience to accommodate her other duties
Technical Women Faculty as wife or as a mother. The departmental climate also
affects women students [5].
Most of the surveys carried out for woman scientists and
engineers in all areas of the workplace reveal generally Women students at universities tend to believe that lack of
lower salaries for female members of the profession. The departmental attention and caring means they do not
discriminatory forces that influence the situation of women deserve to keep going or that they must not be good
in society in general are presumed to influence the careers enough. Most male doctoral students, conversely, are
of faculty women in science and engineering. The talent more self-confident and consider themselves entitled to an
pools from which faculty are hired is closely related to the advanced degree, so the absence of departmental caring
number obtaining their doctorate in science and does not seem to bother them as much as it does to the
engineering. Relatively low rate of continuation of women women. In fact departmental climate and culture play an
into engineering graduate school, compared with that of important part in the progress of doctoral students,
women in other disciplines, cannot be explained in terms of particularly women in science and engineering. To improve
a simple lack of interest in graduate studies on the part of this climate and reduce overall attrition rates in graduate
the women. The attractive job offers available to school, the Graduate School Office may start
engineering BE graduates must certainly be a factor, but institutionalized programs that bring together the faculty,
other factors also appear to be at work. The representation students, and departmental graduate secretaries [2-5]
of women in science and engineering seems to be
increasing at all academic levels. 100
90
Teaching Quality Score
80
Efforts must be made to eliminate discrimination, real or
70
perceived and enhance confidence of woman at work
60
place. To promote careers of women in academia the
50
universities need to develop strategies to attract women
40
scientist and engineers in university. Prioritize women
30
participation by relaxing some strict barrier rules such as 20
publications and experience to let them be floating in main 10
Woman (04/05) Men (04/05)
stream [2-5]. A university can establish an office on the Woman (05/06) Men (05/06)
0
status of women faculty members, whose director is a 1 2 3 4 5 6
senior female professor with line responsibility to the vice
Subjects
chancellor of the campus. Revise the tenure track process
on campus to ensure that untenured women faculty Fig.6 Student teacher’s evaluation in Engineering at
members are indeed reviewed by their peers during the FUUAST (Semester Spring 2006)
44
ENGINEER PEC September 2007
The universities may start special encouraging programs the public in general about the capabilities and
in a well engineered manner. In general it has been contributions of women, developing in women strong self-
observed that female scientist and engineer lecturers esteem and sense of self-competency and discovering
teach more responsibly and well prepared manner what experiences reinforce these attributes. Whilst
compared to male lecturers. Let us see real statistics of the considering full participation and access of women one
male and female staff in the Department of Electrical and also needs to acknowledge the underlying issues that
Electronics Engineering at Federal Urdu University of arts threaten families, institutions, and communities, so that
Science 7 technology Islamabad-Pakistan. This creative and effective social policies can be developed and
department has four female and five male teachers. sustained. Consider subjective issues, identify and
Student’s lecturer evaluation has shown that female address the fears that will be raised by the proposed
assessment score has increased over one year interventions, and consider some scenarios about how to
assessment period whilst men evaluation has gone down handle the consequences and the interconnections.
as shown in Fig.6.
At that point, identify rather specifically what it is that you
This may partly be attributed to male lecturer trend to teach want to achieve. In fact, it is very important to revisit this
in multiple universities to earn more money. Over 400 particular question in a recurring way throughout one's
students have intuitively verified that female lectures of planning, implementation, and evaluation. Yes, repeatedly
electronics engineering, mathematics, computer science concentrate attention on just what is it you are trying to
and humanities deliver more comprehensive and well achieve [7-10]. Let us reiterate our encouragement to
prepared lectures compared to male lecturers. Based on search very carefully for the important feedback loops in
student evaluation the head has decided to increase the interventions, to recognize and to come to grips with
female lecturers and laboratory technician strength to deeply-rooted beliefs and fears that will affect your
provide more comfortable and flexible environment to the success, to be scrupulous in distinguishing myth from
female students in laboratory. Old age heads may request reality, and to pay a great deal of attention to the changing
to management to involve female lecturers in department external context for we are addressing a moving target as
management to configure the environment according to the social, scientific and engineering frontiers advance. As
their personal convenience under supervision of senior we plan and discuss the interventions to enhance the
experienced professors. recruitment and retention of women in science and
engineering, we must bear in mind that much of the design
Future Woman Scientists & Engineers of the current work structures and environments were put
in place a long time ago by people different from those who
Academe need to intervene in a strategic manner to will work in them in the future. We need to consider the
increase woman population in science and engineering future society pattern in which the planned woman work
faculties. Undergraduate, graduate and postdoctoral force will be functioning [9-11].
interventions aimed at recruiting and retaining more
women in scientific and technical fields serve the interests Female High-Tech Emancipation
of education in general as well as the interests of women.
Within an individual department to achieving this goal the Recent developments in attosecond physics have lead to
graduate students in the same or related departments extraordinary expeditious photonic processors [12-15]
such as electronics and telecom may meet together for conceiving perception of infinite bandwidth requiring
discussions on how to get ahead and how to cope with renewed understanding of the fundamentals of science
daily problems in the classroom, in the research and engineering [16]. To go beyond the frontiers of science
environment, and with colleagues and supervisors. and engineering we need to work with woman patience
Academe may start programs of male and female visiting and a mother’s love to unearth the ultimate truth of nature.
scientists and engineers, who meet with the students and What we do today will be regarded as a barbarian time by
other interested people to discuss and facilitate the our women of 2050 as we today think of women selling and
careers of these students in science and engineering [10- buying in dark ages. Today woman scientists and
11].Among recurring topics of discussion are the engineers are only able to design chemical, biological and
relationship of a female student with her peers and with her nuclear weapons but also capable to detect chemical and
research adviser, balancing career and family radiation signatures to ensure existence of such legal
responsibilities, and strategies to eliminate the "chilly weapons and their integral parts. Sulfur mustard breaks
environment" often encountered by women pursuing down in the environment into thiodiglycol and two
graduate studies and later employment in the science and impurities, thioxane and dithiane, which can be identified
engineering. The full access of woman in research goes far as signatures of mustard presence. However, most of
beyond just opening the doors of educational institutions nerve agents such as sarin, soman, and VX contain a
and the workplace. It means changing and enhancing the phosphorus-methyl (P-CH3) bond that is difficult to break
prospects of students, teachers, supervisors, leaders, and rendering its hard detection [17]. Woman as military
45
ENGINEER PEC September 2007
scientists and engineers have full comprehension of the especially medicines, women are much more suited than
significance of high energy lasers, bio materials, men due to their natural sympathetic and loving
nanotechnology, electro-optic sensors, potential temperament that is actually needed to the patient. It is not
techniques and algorithms critical for their national possible today to allow 50% population to stay home
defense, command and control [18]. Woman scientists without any to do. Looking primitive village life the men and
and engineers have most significant role as sales women work in fields together without any sensitivity to
engineers, research scientists and product developers gender at all. Middle class people care the culture and
[19]. build walls on the way of women development. It is duty of
state to provide equal job opportunities to women and
Sadartha [20] defined word love as a passion that a mother develop working environment to build confidence at
has for her baby and ascribed all the other definitions of workplace. Of course new entrant woman will bring new
love as its subsequent derivatives. An old time vision questions and different experiences. Identifying and
needs to be created in modern society where woman understanding the barriers to women's progress in
despite emancipation feels deprived. Woman among men academic and professional careers so that these can be
should have the level of confidence about gender removed or overcome and addressing the communication
interaction the way a man after eating has no feel for challenges women and men face together in the
appetite. Once his/her eating desire is over after dining classroom, in the home, in the workplace, and in volunteer
he/she actually conquers his desire for hunger. A similar activities so that they can be more effective partners in
feel and conquer is needed to woman whilst working their endeavors.
among men. How to achieve is an uphill task that needs
research. We may define civilization as an era when References
women and men will have no depression of being that
gender regarding implementation of their aims and ideas. World Nobel Prize Records, British Library, London UK,
According to Emma [21] peace or harmony between the 2006.
sexes and individuals does not necessarily depend on a
superficial equalization of human beings; nor does it calls Educating the Engineer of 2020, Committee of Engineer
for the elimination of individual traits and peculiarities. The 2020: National Academy of Engineering, 2005.
problem that women confront today, and which the nearest
future is to solve, is how to be one's self and yet in oneness Science and Engineering Programs: On Target for
with others, to feel deeply with all human beings and still Women, edited by M. Lakes and L. Skidmore Dix,
retain one's own characteristic qualities. Our motto should Committee on Women in Science and Engineering, NRC,
not be: forgive one another; rather, understand one National Academies Press, 1992.
another.
N. Z. Khan,’ Unprepared, unwilling and unfit: The Moslems
To understand everything means to forgive everything in the age of IT’, FJWU and HEC Int. Conf. Social
does not appeal many of modern women; it has the odor of Sciences: endangered and engendered, Dec10-12, 2004,
the confessional; to forgive one's fellow being conveys the PP. 323.
idea of pharisaical superiority. The demand for equal rights
in every vocation of life is just and fair; but, after all, the Frontiers of Engineering: Reports on leading edge
most vital right is the right to love and be loved. Indeed, if technologies, National Academy of Engineering. National
partial emancipation is to become a complete and true Academy of Engineering, 2006.
emancipation of woman, it will have to do away with the
ridiculous notion that to be loved, to be sweetheart and H. Salerno,’ Though unsung and ignored women have
mother, is synonymous with being slave or subordinate. To pushed technology frontiers’, Mothers of Invention,
me the position of the working village girl is far more natural Washington Post Writer, July 12, 1997, PP. H01.
and human than that of her seemingly more fortunate
sister in the more cultured professional walks of life i.e. Female Ingenuity: Women and Invention in America by
lecturers, doctors, engineers or layers who have to make a Anne L. Macdonald Ballantine Books: NY, 1992.
dignified, proper appearance, while the inner life is growing
empty and dead. Islam gave the first ultimate Mothers and Daughters of Invention: Notes for revised
emancipation to woman by declaring the close proximity of history of technology by Autumn Stanley: The Scarecrow
God with fathers of daughters on the doomsday. Press Inc: New Jersey, 1993.
46
ENGINEER PEC September 2007
Remedies: Committee on Women's Employment and Critical Military Technologies, Washington Government
Related Social Issues, National Research Council, Printing Office, 2006.
National Academic Press, 1984..
T. Anglaew,” IEEE Woman in Engineering”, IEEE Region
Adviser, Teacher, Role Model, Friend: On Being a Mentor 10 Section Meeting, July, 2006, Thailand.
to Students in Science and Engineering, National
Research Council, National Academic Press, 1997. Sadartha: History of Sadartha Spiritual Life Concepts,
edited by Indian Press, 1950.
T. Juhasz, R. Kurtz, C. Horvath, C. Suarez, F. Raksi and G.
Spooner,’ The femtosecond blade’, Optics & Photonics Emma Goldman,” The tragedy of woman’s emancipation”,
News, PP.24-28, January 2002. Blackmask online 2001: http://www.blackmask.com.
M. Xiao, H. Wang, D. Goorskey,” Light controlling light”, Dr. Nasrullah Khan (59); Senior Member
Optics & Photonics News, PP.45-48, Sep, 2002. IEEE (00625749); President’s Award of
Pride of Performance (2006); Member
G. A. Mourou and V. Yanovsky,” Relativistic optics: A gate IEP; Registered with PEC (Elect/4685);
way to attosecond physics”, Optics & Photonics News, acquired his BSC Electrical Engineering Degree (84) from
PP.40-45, May 2004. UET Lahore, MSC (87) from Reading University (UK) and
PhD (92) from Essex University UK. He has 23 years work
Schrödinger's Rabbits: The Many Worlds of Quantum, and teaching experience with 5 books and 130 research
edited by C. Bruce, NAP, 2004. publications. Currently, he is working as a Professor in the
Department of Electrical Engineering, FUUAST
Technologies Underlying Weapons of Mass Destruction, Islamabad. His areas of research include Electro-Optics
Washington Government Printing Office, December 1993. and Lasers, Optoelectronics, Protective Relaying and
Electric Power Quality.
47
ENGINEER PEC September 2007
Let’s Affiliate PEC with ABET & [2]. We as engineers and scientists have marked lines to
divide the land and airs into borders else the matter is
FEANI barely opposite. We do propose, amend, modify and
…it is just in time to apply now... optimize things over time to configure the policies to divide
knowledge and wisdom into known professions, as a result
Dr. Nasrullah Khan of common human nature, we are likely to place new
wisdoms in disciplines that are usually correct but likely to
Abstract be incorrect due to lack of understanding or knowledge of
its further developments, investigations or major future
Globalization through emerging revolutionary enabling applications.
and numerical communication technologies with
increased interdisciplinary merger of disciplines such as Authorized engineering education accrediting and
electronics, photonics, bioelectricity, neuroscience, recognizing practices are very strict in Pakistan but in
artificial intelligence, integrated optics, nanotechnology, some cases accreditation bodies do declare the pure
polymer sciences and information technologies in science engineering education either science or technology.
and engineering has caused sheer collapse of orthodox Sporadically good engineers are mistakenly classified as
consensus on concepts of engineering education. It has scientists or technologists and vice versa. My major
become too difficult to recognize what is science or impetus is to reorient the thinking of engineering councils,
engineering. As a matter of fact the many of the subject boards or bodies regarding recognition of technical skills
specialists carrying science degrees are very good earned by youngsters that professional recognition bodies
engineers whilst many other subject specialists carrying do not recognize and the skilled manpower is eventually
engineering degrees are basically engineering scientists. wasted after spending time, money and efforts. It is a
This paper explores the major differences in science, havoc loss of available resources in many countries,
technology and engineering to enable Pakistan especially Pakistan. Recognition of applied science,
Engineering Council (PEC) to focus on the need of technology and engineering although very late but still just
recognizing our engineering education accreditation in time to consider it. In this case the affected people are
standard in the light of international practices of ABET innocent youngsters and miserable parents - neither the
(USA) and FEANI (Europe). In present paper the PEC is concerned degree awarding institutes nor the accrediting
emphasized to accommodate across discipline technically body with its so obvious policy. Graduates from the Quade-
matured engineering sciences as an integral part of Azam University Islamabad, Government College Lahore
engineering education to demark the narrowing blue line or Peshawer University have perfectly learnt all major
between pure and applied engineering. Finally it will be subjects on electronics, logic design, digital signal
accentuated why it is important for PEC to seek the processing, communication, semiconductor devices,
membership of transnational engineering education a n a l o g u e c i r c u i t s , e l e c t r o m a g n e t i c t h e o r y,
regulatory bodies to emerge as a globally recognized microcontrollers and microprocessors but no one accepts
engineering education accrediting authority of Pakistan. their education equivalent to graduate electronics
engineers.
Keywords
Either such programs may be discontinued by the order of
Science, Technology, Engineering, Education, Higher Education Commission Islamabad or be accepted
Accrediting and Recognition. with suitable upgrade courses. We can not export this
manpower to Middle East as they do not have a
1. Science, Engineering and Technology professional engineer license. If the same students with
same knowledge and contents of study come from any
By the end of twentieth century the science and other country out of any engineering degree awarding
engineering knowledge has become too embedded within institutes then the same will be accepted without counting
each other from molecular to complex system level due to the square feet of their classrooms. It is wastage of
emergence of the enabling, communication and manpower and resources that need to be seriously viewed
information technologies; that it has, unbelievably, by the authorities in the greater interest of Pakistan.
become impossible to minutely classify or draw a narrow According to the PEC advice to the universities, in order to
line to segregate the frontiers of science and engineering be considered for accreditation, engineering programs
education and research [1]. It is so unremitting in terms of must be designed to prepare graduates for the practice of
realizable borders at all frontiers of science, technology engineering at a professional level. Programs designed to
and engineering. As a matter of fact it is nature that by prepare graduates for supporting roles in engineering i.e.
definition is so articulated and organized in a complex engineering technology are not eligible, nor are the
nonlinear manner that no science or engineering rule is programs which do not provide an adequate base for the
able to segregate it from one another. In decades turnover application of fundamental concepts to the practice of
ever amazing developments have further expanded its engineering. In fact PEC violates its above mentioned
frontiers and the more we discover the more we are lost in it
48
ENGINEER PEC September 2007
guidelines by accepting British 3 Yrs BE Engineering details on PEC are available on its website [3]. Engineering
Program. qualifications awarded by the following foreign universities
and institutions are acceptable to PEC as recognized
It is in fact hard to assess who actually knows practice of engineering qualifications.
engineering at intellectual and professional level. PEC
needs to define clear instrumental definitions measuring American Universities/Institutions:
the desired entry level practice qualification. Now the PEC Accredited by the Accreditation Board of engineering &
has a digital library and access to 70-80% science and Technology. (ABET). New York, USA [4].
some 20-30% engineering journals that are a good sign of
development. PEC activities such as start of this Engineer U.K. Universities/Institutions:
pec magazine, paper prizes, newsletters and seminar Accredited engineering degree programs in the list issued
series shows its live involvement and warm wishes to be by Engg Council of UK in 1993 and their subsequent
functional and progressive. A few years ago the PEC had updated versions [5].
neither any professional refreshing course plans for old
engineers. However, it is a point of concern for all European Universities/Institutions:
engineers including PEC why it has filed to register itself to Accredited engineering degree programs as per index
any international engineering board or forum that can published by the European Federation of National
update its accrediting and recognizing policies. I certainly Engineering Association (FEANI) Paris, France in the year
beg pardon of the PEC if any of my suggestions is not in the 1992 and their subsequent updated versions [6].
interest of PEC or its members or Pakistan at the end of the
day. Our neighbor country is exporting such manpower to Canadian Universities/Institutions:
Middle East and earning lot of foreign revenue and we in Accredited engineering degree programs in the list issued
the form of PEC are sticking to so called dead English rules by the Canadian Engineering Accreditation Board (CEAB)
and trying to push the elephant in the mouse hole. I can to in the year 1995 and their subsequent updated versions [7]
PEC examples of several foreign universities degrees that
are accredited by PEC and the students have same level of Australian Engineering Universities/Institutions:
wisdom as our QAU BSC electronics graduates. Either Accredited engineering degree programs as per Australian
electronics degree holders may be granted accreditation engineering courses recognized by the Institutions of
as engineering scientists (B-Tech) or engineers. Legal Engineers, Australia in the year 1994 and their subsequent
status of B-Techs and BE may be ascribed under a uniform updated versions [8].
consensus of PEC and HEC experts.
Pakistan Engineering Council (PEC) did not mention of its
2. Pakistan Engineering Council own compliance to above four bodies and many other
international professional bodies such as BCS, UK [9],
Pakistan Engineering Council (PEC) is a statutory body CEE, Europe [10], ECA, Europe [11], ENIC, Europe [12],
constituted under the PEC Act No.V of 1976 enacted by the ENQA, Europe [13], IPENZ, New Zealand [14], USCIEP,
Parliament. Some of its statutory functions relate to USA [15], ECSA, South Africa [16], HKIE, Hong Kong [17],
recognition of engineering qualifications for the purpose of and most importantly the Washington Accord [18], Dublin
registration of professional engineers and consulting Accord [19] and Sydney Accord [20], and lately EMF [21]
engineers and promotion of engineering education, regarding the accreditation and recognition or vice versa.
safeguarding the interests of its members and fostering of Even the LC of any Pakistani bank is acceptable globally
high professional standards in the country. PEC interacts but the PEC certificate is not considered as a valid
with the Government, both at the Federal and Provincial document by ABET (USA), FEANI (France), CEAB
level by participation in Commissions, Committees and (Canada) and IEA (Australia). PEC should explain to the
Advisory Bodies and acts as a think tank to Government of member engineers and engineering degree awarding
Pakistan. The PEC is a fully representative body of the institutes, why the PEC has not registered itself or sought
engineering community in the country and works membership of any transnational engineering degree
transparently. PEC forms an effective bridge between recognizing and engineering program accrediting body
Government, industry and education. Over the past such as ABET (USA) and FEANI (Europe) in last five
quarter century PEC has grown into a mature professional decades. The PEC is pleased to say that she accepts
regulatory body with an unblemished record. It is not too degrees accredited by such and such without any vice
difficult to conceive the scenario in the country, had there versa acceptance. It is all useless if they do not accept
been no PEC on the landscape. Not only the international yours accredited engineering degree in return.
recognition of our engineering degrees would have been At this moment most of the foreign bodies do look at the
perilously set aside, our own market would have been degree granting university and not on the PEC certificate.
flooded with under and sub-qualified engineers. ABET, FEANI and CEAB ask for clearing their own six
Maintenance of a register of persons qualified to practice month’s professional engineer’s test. I personally honor to
as professional engineers and consulting engineers. More the establishment of the PEC and its role but literally how a
49
ENGINEER PEC September 2007
body can talk or refer to international standards to force the women engineers to meet the upcoming challenges? As a
institutions when she herself is not regarded as an think tank the PEC must start thinking now and leave no
engineering degree recognizing or accrediting authority by stone unturned to seek the membership of Washington
other international bodies. Let us say PEC was initially not Accord that India has already done last year in 2005.
registered by the international bodies [4-8] then why the Almost 95% engineers in Pakistani Universities are
PEC did not struggle to develop links with such well known specializing in electronics and telecommunication under
bodies to seek guidelines how to improve the engineering all the PEC accredited and recognized programs. Nearly
education in Pakistan with so many perks. The PEC is itself 90% of the real industry demand is electrical and
not well performing its functions like looking after the automation engineers (not the electronics or telecom
interests of people of this country and engineering engineers); has the PEC ever thought of forcing the
practices within international standards on public safety universities for proportional intakes?
and reliability.
Hardly 5% engineers are studying electrical engineering
Repeated collapse of bridges, building and networks is self and all the rest registered in BE telecom or BE electronics
speaking proof of the norms and engineering standards programs [22]. It is sole responsibility of the PEC and HEC
maintained in the country. This nation has suffered the to maintain reasonable proportion of manpower in all
most in history due to the PEC deaf ears towards follies disciplines. Who is going to take care of WAPDA utility
committed by the construction industry ever since in networks spread across the country? Has PEC or HEC or
Pakistan? Why PEC did not introduce the building codes MOST ever thought of it? No! All of our neighboring
earlier before occurrence of repeated earthquakes around countries have joined or joining international accreditation
Islamabad? Which road does not need repair within few and recognizing bodies to internationalize the competency
months of its construction? Which factory is observing of their graduate engineers but regretted to say that
safety rules and safety standards in the common electric nothing is being done at an adequate level by the PEC for
products for public use? Over 80% metallic casing the betterment of its graduate engineers in global era.
products such as washing machines and refrigerators Many bilateral and multilateral agreements can be
have no safety grounding green/yellow wire and in 85% established between countries and organizations
house and industrial wirings the test reports are issued worldwide but PEC has no time for it, still claiming taking
without even actual visit of the test inspector to the care of its member engineers. Young engineers are not
installation site. How many engineers have been aware of it but the PEC should recognize the problem
blacklisted due to their poor performance of work or ahead being a dedicated professional body with a
misconduct or corruption charges? Many engineers have mandate that supposes PEC to do it. Simple agreements
been terminated on corruption charges in past in multiple do not give free mobility facility, but still can be important,
departments in Pakistan; did the PEC remove their names especially on a regional level they are likely to be
from the register? I do not know in what sense the PEC is preempted by large-scale, multinational, mutual
safeguarding the interests of this country or its members. agreements. If transnational mobility facility is granted to
When our engineers go to Canada they need to spend our engineers then they can freely move and even work or
several months to qualify the CEAB tests to seek participate in international professional activities.
professional license. They do not accept PEC registration
certificate. 3. Accreditation of Accrediting Bodies
If the PEC member engineers have no acceptance outside For international recognition of engineering degree
the Pakistani borders then how the PEC can talk of programs the international accreditation boards and
compliance to international engineering standards and bodies need to cooperate with one another to reach a
statutes [3]. In fact the PEC reflects a symbol of horrible consensus that may eliminate the need to again test the
police instead of its kind role as adviser to the engineering capabilities of engineering professionals from sister
degree awarding institutes. As a member of Washington countries. As the economic globalization increases [23-
Accord [18] our engineers can have facilities to work here 24], we must bring down artificial barriers that limit
or abroad and claim many mobility facilities across the workforce mobility and related issues. One way to increase
borders. At present it makes no sense why to bother about mobility is through the mutual recognition of degrees,
PEC if the engineers have to work abroad or in private degree programs, and accreditation systems. Now
industry. PEC also points on the private engineering international community has a strong desire to work
degree awarding institutes without mentioning the plight of towards global harmonization that needs workforce
government institutes, which reflects quite a bit of bias that mobility. This has provoked a great deal of activity,
needs to be reworded and equal caring attitude need to be especially in countries that do not have recognized
meted out to all engineering degree awarding institutes accreditation systems in place, or even a tradition of
within our country. By year 2050 some 88% of world accreditation like Germany [23]. The United States, which
population will be residing in South East Asian region [21]. has a strong tradition of engineering accreditation, it is also
Is PEC planning how to cope with situation and preparing working toward global recognition of accreditation
50
ENGINEER PEC September 2007
methods. Mutual recognition and accreditation will not only applicant accrediting body has demonstrated that the
benefit graduates in a particular country, but will also accreditation system for which it has responsibility
promote quality control and attract students to national appears to be conceptually similar to those of the other
degree programs. It is generally accepted that a signatories of the Washington Accord. By conferring
competent practicing engineer must have a strong provisional status, the signatories have indicated that they
education that teaches analytical and theoretical thinking consider that the provisional signatory has the potential
that enables problem solving, innovation, and invention. If capability to reach full signatory status. Award of
not invention then at least instant modifications; training in provisional status in no way implies any guarantee of the
working with people from diverse backgrounds and solving granting of full signatory status. Equivalence of the
technical problems to maintain the existing engineering engineering programs concerned shall normally become
infrastructures on place; and work experience, including effective from the date on which the new signatory was
responsibility for making decisions on time to deal with admitted to full signatory status. For the admission of new
emergencies and long term planning to predict calamities signatories to the Washington Accord requires an
and failures. Let us review the existing internationally application for provisional status to the Washington Accord
established engineering accords, boards and councils for supported by nominations from two of the existing
initial membership or affiliation of PEC. signatories. A positive vote by at least two-thirds of the
existing signatories, a prescribed period of provisional
3.1 Washington Accord status (minimum period of two years), during which the
accreditation criteria and processes established by the
Washington Accord [18] was signed in 1989 by the groups applicant, and the manner in which those procedures and
in Australia, Canada, Ireland, New Zealand, the United criteria are implemented, will be subject to comprehensive
Kingdom, and the United States responsible for examination by a Washington Accord review team.
accrediting professional engineering degree programs in Unanimous approval of the existing signatories for
their countries. The accord recognizes “substantial transition of the provisional signatory to the regular
equivalency” of the programs accredited by the signatories signatory is prerequisite. The application for Provisional
and satisfaction of the “academic requirements for the Signatory status must be submitted by PEC to the
practice of engineering at the professional level.” The Secretariat of the Washington Accord in both printed and
accord states that the “processes, policies and electronic form at least 120 days prior to the next meeting
procedures” used in the accreditation of academic of signatories, and in the format given in Washington
programs are comparable and “recommends that Accord [18]. A decision to admit to Provisional status shall
graduates of accredited programs in any of the signatory require the affirmative vote of two-thirds of existing
countries be recognized by the other member countries as signatories, and a decision to admit to full signatory status
having met the academic requirements for entry to the shall require the unanimous vote of existing signatories.
practice of engineering as per WA. However, the Such votes shall normally be taken at general meetings of
Washington Accord has several limitations. First, it covers signatories. The Accord has also approached to an
professional engineering undergraduate programs but not international funding agency to explore the possibility of
engineering technology or postgraduate programs. funding support for developmental assistance to countries
Second, it does not apply to degree programs accredited applying to become members of the Accord.
before signing by the accrediting body. Third, it does not
apply to degree programs declared or recognized as Accreditation Board of Engineering & Technology (ABET)
“substantially equivalent” by the signatories. Finally, it is recognized by the American Council for Higher
covers only the academic requirements of licensing, but Education Accreditation. In general, ABET does not
not the actual licensing, which still varies from country to accredit foreign programs outside USA. However, it issues
country. Interest in the Washington Accord has increased substantial equivalency certificates for similar oversees
significantly since it was signed in 1989. Two more programs if they qualify in educational outcome. ABET has
countries have signed on since then and are now full signed a number of mutual recognition agreements with
signatories: Hong Kong in 1995 and South Africa in 1999. accrediting organizations of other countries. PEC may
Four countries have been added as provisional apply for it like India, and Bangladesh and others.
signatories: Japan in 2001 and Germany, Malaysia, and Signatories agree to recommend that graduates from
Singapore in 2003. In addition, the accreditation bodies of recognized programs be afforded the same rights and
India and Bangladesh have recently expressed their intent privileges as those graduates in the home country. ABET
to submit applications for provisional membership, and recognizes through agreements such as the Washington
Russia has sent representative to the meetings of the Accord, and offers educational credentials evaluation
Washington Accord signatories. services. It is to point out that ABET accredits the
engineering programs through its Engineering
To seek membership of the Accord the accrediting Accreditation Commission (EAC) not the institutes. PEC
organization needs to apply for provisional signatory may apply for membership of Washington Accord the way
status. The provisional signatory status means that the as normal universities apply to PEC for accreditation and
51
ENGINEER PEC September 2007
the ABET will process the case. For more information PEC http://www.feani.org/.
may contact ABET, Inc.111 Market Pl., Suite
1050Baltimore, MD 21202 ; Abet website: 3.3 Engineers Mobility Forum
http://www.abet.org/contact.shtml, USA.
The Engineers Mobility Forum (EMF) [21], established in
3.2 The EUR ING Professional Title October 1997, was initially formed as a subcommittee of
the Washington Accord signatories to facilitate the mobility
The Fédération Européenne d’Associations Nationales of experienced professional engineers. Unlike the
d’Ingénieurs (FEANI) [6] (translated as the European Washington Accord, which focuses on mutual recognition
Federation of National Engineering Associations) is a of accredited academic programs, EMF is developing “a
federation of national engineering associations from the system of mutual recognition of the full professional level to
EU, European Free Trade Association, and countries facilitate cross border mobility of registered practitioners.”
considered “eligible for accession into the EU” at a future This is especially important for currently practicing
time. Currently, FEANI, which has 26 member countries engineers whose qualifications are not recognized through
representing more than two million professional the Washington Accord (EMF, 2003). EMF maintains a
engineers, considers itself “the single voice for the decentralized Register of International Engineers that
engineering profession in Europe” and is working to “affirm includes the names of professional engineers in member
and develop the professional identity of engineers.” The countries who meet very specific educational and
European Commission recognizes FEANI as the official experiential guidelines. The purpose of the registry is to
representative of the engineering profession in Europe. streamline the process of obtaining practice privileges in
One of the services provided by FEANI, the granting of the EMF-member countries. The registry is “decentralized” in
EUR ING professional title, is intended to “facilitate the the sense that each country operates its own section and
mutual recognition of engineering qualifications in Europe” writes its own “assessment statement” describing the
and facilitate mobility by assigning a “guarantee of admission requirements for that country. A monitoring
competence” to engineers who wish to practice outside committee in each country develops the assessment
their own countries, provide information to employers statement, reviews applications for admission to the
about educational and training systems in Europe, and registry, and functions as the point of contact for all matters
encourage continuous improvements in the quality of relating to the registry. EMF members include the national
engineers by monitoring and reviewing standards. engineering organizations of Ireland, the United Kingdom,
Currently, slightly fewer than 30,000 registered engineers United States, Canada, South Africa, Hong Kong,
have been granted the EUR ING title. FEANI maintains an Australia, Japan, Malaysia, Korea, and New Zealand.
index of universities and other institutions of higher FEANI has observer status, and India and Bangladesh
education and their engineering degree programs have expressed an interest in joining EMF. With the signing
recognized as fulfilling the mandatory educational of the EMF Agreement in June 2001, the International
requirements for the EUR ING title. Member countries Register of Professional Engineers (IRoPE) was
submit descriptions of schools and degree programs for established (IPENZ, 2000).
inclusion in the FEANI Index upon approval by the
European Monitoring Committee. The FEANI Index is 3.4. Vision of Global Engineering Registrar
intended to be the “authoritative source of information
about national engineering education systems and Global Engineering Registrar (GER) would be the
educational institutions”. Basically, FEANI takes care of its authorized body responsible for accrediting professional
member European countries only but International engineering degree programs and registering professional
Engineering Institutes and organizations may seek degrees through its representative offices through out the
membership of FEANI regarding accreditation or world. The member countries will have equal
equivalency of their programs. Engineering organizations representation in global office and all of them will be bound
of several countries like Association for Engineering to guidelines and rules framed by the GER. Universities
Education in South and Central Asia (AEESCA) and The and colleges lacking compliance to the proposed GER
Institution of Engineers, India, Federation of Engineering regulations may be notified to make necessary corrections
Institutions of South and Central Asia (FEISCA) Nepal, in their procedures if not caring they may be ousted from
Union of Chambers of Turkish Engineers and Architects the GER list. It could be even more useful to design
(UCTEA–TMMOB) Turkey, Association for Engineering common courses and experiments for all the universities to
Education in Southeast Asia and the Pacific (AEESEAP) minimize the overall differences. GER may refuse license
and The Institution of Engineers, Indonesia, The Institution extension to engineers found involved in corrupt practices,
of Engineers, Malaysia (IEM) Malaysia and The Institution bankruptcy and cheating. This will isolate the bad
of Engineers Singapore (IES) Singapore, have already professionals and incompetent engineers throughout the
sought membership of FEANI for the possible intuitive world. The people who do malpractices in one country and
recognition purposes. PEC may also apply to FEANI at Av. hide in others will have no safe heaven for second chance.
Roger Vandendriessche 18, B-1150 Brussels, Belgium Certainly, in this information era, the engineering ethics
52
ENGINEER PEC September 2007
53
ENGINEER PEC September 2007
Quality Assurance and Accreditation assessment mechanism to judge the level of quality
achieved. Recognized national and international bodies
of Higher Learning have standardized and published such criteria sets of
quality concepts and principles for assurance and
Dr. Nawar Khan accreditation. A few quality criteria and systems for
assurance and accreditations discussed here are;
ABSTRACT
Institutional Quality Assurance System.
t
Quality and management of processes and functions in National and International Quality Assurance
t
educational institutions of higher learning in the developing Systems.
countries are facing a lot of challenges in terms of National and International Quality Accreditation
t
establishment and improvement. The challenges have Systems.
root causes embedded in their societies that have become
impediments for social, industrial and financial An educational program of higher learning is usually
development. Assurance and accreditation of quality accredited nationally for its quality management and
management system of education are the means available assurance system. For example, Pakistan Engineering
for improvement, recognition and stakeholders Council (PEC) is performing such role of accreditation for
satisfaction. Institutional, national as well as international engineering education in the country. I order to be
quality criteria set, management system and assessment recognized internationally for quality, management and its
mechanism are available for quality improvements which assurance, national education systems can be accredited
can be adopted by educational institutions to become from reputed international accreditation bodies, for
world class. example, Accreditation Board of Engineering and
Technology (ABET) accredittion system for engineering
Key words: education.
Higher Learning, Quality Management System, All these quality improvement, management, assurance
Developing Countries, Quality Challenges, Quality and accreditation activities are complementary to each
Assurance and Accreditation, Institutional, National and other in progression. None of them can be claimed better
International Criteria. or superior to others in terms of scope and objectives.
54
ENGINEER PEC September 2007
There are a few important dimensions of a good quality ISO 9000 Quality Management Systems (QMS) standard
student as follows: was first aired in 1987 by the ISO Headquarters. ISO 9000
QMS is a world wide standard that establishes the
Maturity
t requirements for quality and management system of any
Social Norms
t institution. The standard was revised in the year 1994 and
Physical Condition
t now the latest version in use is ISO 9000:2000. Next
revision of the standard is expected in year 2008.
55
ENGINEER PEC September 2007
ISO 9000 QMS is a certification, third party audit and College of Electrical and Mechanical Engineering
t
documentation based standard. It is applicable to all sizes Pakistan Naval Engineering College
t
and types of institutions. It has comprehensive quality College of Aeronautical Engineering
t
criteria set based on quality principles for management
and assurance of education services. It can bring 7. NATIONAL QUALITY ENHANCEMENT AND
consistency in documentations, procedures, processes ASSURANCE SYSTEM
and quality of services in the educational institutions. ISO
Continual Improvement of the
9000 QMS standard provides opportunities for quality
Quality Management System
improvement through periodic audits and reviews.
Customer Focused
t 8. QUALITY ACCREDITETION BODIES AND
Leadership
t SYSTEMS
Involvement of People
t
Process Approach
t here are a number of accreditation institutions in the
System Approach of Management
t country and abroad that accredit the QMS of learning
Continual Improvement
t bodies. These are as follows
Factual Approach to Decision Making
t
Mutually Beneficial Supplier Relationship
t PMDC for Accrediting Engineering and Medical
t
Education in Pakistan (PEC Form AC-1)
6. CONTINUOUS QUALITY IMPROVEMENT MODEL Accreditation Board of Engineering & Technology
t
FOR EDUCATION (ABET)
An ‘ISO 9000 Process Approach Model’ for continuous Association of Advance Collegiate Schools of
t
quality improvement and assurance is shown in Figure 1. Business (AACSB)
Here, the customer requirements are converted through Computer Science Accreditation Board (CSAB)
t
education process into outcome (quality graduate) for
customer satisfaction. However, continuous quality PEC has its own criteria set for accreditation of
improvements of all aspects of education processes is the engineering education in the country as shown in Annex D
essence of this quality excellence process model. (www.pec.org.pk).
NUST is one of the public sector universities which took the 9. INTERNATIONAL QUALITY ACCREDITETION
initiative to adopt ISO 9000 QMS standard for quality SYSTEM
assurance of education system being followed in its
different constituent colleges, centers and institutions as ABET is a well known accreditation body for education in
follows:- engineering. Its accreditation criteria set is shown in nnex
E(ww.abet.org.
56
ENGINEER PEC September 2007
Legend: Exams– Entrance, quiz, term, oral and final Following are a few major points for consideration;
examinations Institutional quality enhancement and assurance
t
system be replaced with either national or
Quality Control (QC) – Process Control (SPC and SQC) international system.
ISO 9000 QMS standard certification should be made
t
Quality Assurance (QA) – System Control (Operation mandatory for all learning bodies of higher and lower
Management) echelons of education system of both public and
private sectors.
National Quality Accreditation (NQA) – National HEC should establish an ISO 9000 QMS cell to
t
Recognition centrally plan, control and fund the complete
implementation program of ISO 9000 QMS standard
International Quality Accreditation (IQA) – International PEC should conduct seminars in major engineering
t
Recognition institutions of the country for awareness and
promotion of accreditation criteria and its assessment
11. QUALITY EXCELLENCE MODEL FOR HIGHER mechanism.
EDUCATION PEC should encourage its accredited institutions for
t
ABET accreditation.
Followings are the main factors of support for a proposed Duplication and overlapping in assurance standards
t
quality model of higher education as shown in Figure 3. and accreditation criteria be removed to reduce the
work load on academia.
Quality Vision, Goals and Mission
t t
Academic Standards, which include curricula and
t 13. CONCLUSIONS
duration etc.
Quality of processes and functions in educational
57
ENGINEER PEC September 2007
58
ENGINEER PEC September 2007
59
ENGINEER PEC September 2007
60
ENGINEER PEC September 2007
22.2 Internal Resource Generation Development: The Response to Change, In: United
23. Research and Publications Nations Industrial Development Organization 30
23.1 Faculty Research Grant years of industrial development 1966-1996, Ed:
23.2 Effective Utilization of Research Grant and its Brennan P.J. and Weston G. Published by ISC in
Net Outcome association with UNIDO London UK pp. 380-389
23.3 Faculty Publications in HEC Approved Journals 5. Sandholm, Lennart, (2000). Quality In Developing
Countries In: Juran’s quality control Hand book 4th
23.4 Continuity of Faculty Research
edition ed. Juran J.M. and Gryna F.M. McGraw Hill inc.
23.5 Academic Collaboration
6. Wilson, Steven R. (1995). The Quest for
23.6 Textbooks Written by Faculty Members Recognizable Standard: New path in Quality,
23.7 Budgetary Allocation for Conferences, Standardization and Metrology, In: United Nations
Seminars, Colloquium etc. Industrial Development Organization 30 years of
23.8 Computer and Internet Facilities industrial development 1966-1996, Ed: Brennan P.J.
23.9 A c c e s s i b i l i t y o f F a c u l t y / S t u d e n t s t o and Weston G. Published by ISC in association with
Computers/Internet Facilities and International UNIDO London UK pp. 362-371
Databases 7. Vincent, K.O. and Joel E.R. (2004). Principles of Total
24. Industrial Linkage Quality, London Kogan Pages Ltd
24.1 Industrial Liaison Office 8. www.abet.org
24.2 Commercialization of Research Findings 9. www.iso.google
25. Website 10. www.pec.org.pk
11. Yung, Winco K. C. (1997). The Value of TQM in the
Annexure ‘E’ Revised ISO 9000 Quality System, International
Journal of Operation & Production Management
volume 17 issue 2 pp. 221-230
INTERNATIONAL ACCREDITETION CRITERIA SET
FOR ENGINEERING About Author
PEC Registration. No: ME3640
(ABET Criteria set)
General for Criteria for Basic Level Programs Dr. Nawar Khan is a professional
1. Criterion 1. Student Mechanical Engineer. He graduated
2. Criterion 2. Program Educational Objectives from the University of Engineering and
3. Criterion 3. Program Outcomes and Assessment Technology Peshawar in 1981 and
4. Criterion 4. Professional Component later did his MSc Mechanical
5. Criterion 5. Faculty Engineering (Specialized in
6. Criterion 6. Facilities Production Engineering) from the
7. Criterion 7 Institutional Support and Financial University of Engineering and Technology Lahore in 1995.
Resources Dr Nawar Khan completed his Ph.D under a split Ph.D
program of MoST from the University of Engineering and
8. Criterion 8. Program Criteria
Technology Lahore and De Montfort University, Leicester
UK in August 1999. His field of specialization is Total
14. REFERENCES Quality Management (TQM), particularly the ‘Quality
1. Eicher L. D. and Mikil R. (1993). Perception Of Quality Awards’. He has got his MBA degree, specialized in HRM,
In The Developing Countries In: ISO 9000 Quality in January 2005 from Allama Iqbal Open University
Management System, UNCTAD/GATT and ISO joint Islamabad. He is also a Certified Quality Assurance Lead
publication Geneva Switzerland Auditor for ISO 9000:2000. He is author of a number of
2. Hewitt, Tom and Wield David (1995). Technological national and international research publications. Dr Nawar
Capabilities and Competitiveness. Two Needs That Khan is also the Principal Investigator of Pakistan National
Defy Measurement In: United Nations Industrial Quality Award (PNQA) project for Higher Education
Development Organization 30 years of industrial Commission (HEC) of Pakistan. He is a member of
development 1966-1996, Ed: Brennan P.J. and Institute of Engineers, Pakistan and lifetime member of
Weston G. Published by ISC in association with Pakistan Engineering Council. Presently, he is serving as
UNIDO London UK pp. 330-337 Professor at the College of Electrical and Mechanical
3. Nawar, Khan and Sheikh, M.A. R. (October 1997). Engineering, Peshawar Road Rawalpindi, a constituent
ISO 9000 - The Core of TQM for A Developing College of the National University of Sciences and
Country. In: Proceedings of Pakistan’s Third Technology (NUST), Pakistan.
International Convention on Quality Control. Lahore:
Ibrahim Publisher pp.333 - 347
4. Prokopenko, Joseph (1995). Human Resources
61